-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathindex.html
More file actions
143 lines (143 loc) · 44.4 KB
/
index.html
File metadata and controls
143 lines (143 loc) · 44.4 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <link rel="alternate" hreflang="de" href="https://www.stephanwiefling.de/de/"> <link rel="alternate" hreflang="en" href="https://www.stephanwiefling.de/"> <link rel="stylesheet" href="/assets/main.css"> <title>Stephan Wiefling | Post-Doctoral Researcher (Authentication, Usable Security)</title> <meta name="generator" content="Jekyll v3.8.7"/> <meta name="author" content="Stephan Wiefling"/> <meta property="og:locale" content="en"/> <meta name="description" content="Post-doctoral researcher in IT security focused on authentication and usability. Publications can be downloaded here."/> <meta property="og:description" content="Post-doctoral researcher in IT security focused on authentication and usability. Publications can be downloaded here."/> <link rel="canonical" href="https://www.stephanwiefling.de/"/> <meta property="og:url" content="https://www.stephanwiefling.de/"/> <meta property="og:image" content="https://www.stephanwiefling.de/assets/s.jpg"/> <meta property="og:type" content="website"/> <meta name="twitter:card" content="summary"/> <meta property="twitter:image" content="https://www.stephanwiefling.de/assets/s.jpg"/> <meta name="twitter:site" content="@swiefling"/> <meta name="twitter:creator" content="@swiefling"/> <script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"Stephan Wiefling"},"description":"Post-doctoral researcher in IT security focused on authentication and usability. Publications can be downloaded here.","image":"https://www.stephanwiefling.de/assets/s.jpg","name":"Stephan Wiefling","sameAs":["https://twitter.com/swiefling","https://www.researchgate.net/profile/Stephan_Wiefling","https://www.linkedin.com/in/stephan-wiefling"],"url":"https://www.stephanwiefling.de/"}</script> <meta name="google-site-verification" content="gG5d5ZUrpcEu5FvwSflynuawKns8lfnsOX9R1PTKgNc"/> <link rel="me" href="https://hci.social/@swiefling"> <meta name="thumbnail" content="https://www.stephanwiefling.de/assets/s.jpg"> <link rel="shortcut icon" type="image/x-icon" href="https://www.stephanwiefling.de/favicon.ico"> </head> <body> <div class="container lang mt-3 mb-1" aria-label="Select language of the website"> <nav class="row"> <ul class="nav nav-tabs" role="navigation" aria-label=""> <li class="nav-item"> <a class="nav-link active" href="/">English</a> </li> <li class="nav-item"> <a class="nav-link " href="/de/">Deutsch</a> </li> </ul> </nav> </div> <div class="container main pt-4 pb-2 mt-1 mb-3" aria-label="Main content"> <main class="row"> <div class="col-xl-4 col-lg-5 pb-3"> <div class="container"> <div class="row header"> <div class="col-12"> <a href="/"> <h1 class="w-auto">Stephan Wiefling</h1> </a> </div> <div class="col-7 col-md-12"> <a href="/" class="d-sm-block"><img class="img-fluid" alt="Stephan Wiefling" src="/assets/stephan_wiefling.jpg"></a> </div> <div class="col-12 pt-1"> <table aria-label="Contact data"> <tr> <th class="pr-2"><i class='icon-mail-alt'></i></th> <td>[firstname] (a) swiefling.de</td> </tr> <tr> <th class="pr-2"><img src="/assets/icons/m.svg" alt="Mastodon" class="icon-gray"></th> <td><a href="https://hci.social/@swiefling" target="_blank">@swiefling@hci.social</a></td> </tr> <tr> <th class="pr-2"><img src="/assets/icons/rg.svg" alt="ResearchGate"></th> <td><a href="https://www.researchgate.net/profile/Stephan_Wiefling" target="_blank">Stephan Wiefling</a></td> </tr> <tr> <th class="pr-2"><i class='icon-linkedin-squared'></i></th> <td><a href="https://www.linkedin.com/in/stephan-wiefling" target="_blank">Stephan Wiefling</a></td> </tr> </table> </div> <div class="col-12"> <nav class="navbar navbar-expand-md navbar-light mt-2"> <span class="navbar-brand">Pages:</span> <div class="btn-group" aria-label="Main navigation"> <a href="/" class="btn btn-outline-primary active">About</a> <a href="/publications/" class="btn btn-outline-primary ">Publications</a> </div> </nav> </div> </div> </div> </div> <div class="col-xl-8 col-lg-7"> <div class="container content"> <div class="row"> <div class="col bg-secondary pt-1 text-white"><h2>About</h2></div> </div> <div class="row py-2"> <div class="col"><p>I’m a postdoctoral researcher in the field of Cyber Security. My current research spans areas of <strong>Authentication</strong> and <strong>Usability</strong>, and <strong>Privacy</strong>. Among other things, I am researching how to improve the security of passwords without reducing usability. My work was featured in Schneier on Security, The Daily Swig, t-online.de, GIGA.de, Heise, Golem.de, Kölner Stadtanzeiger, and other media outlets.</p> <p>Currently, I work as a <em>Senior Expert DevSecOps</em> and <em>Usable Security Consultant</em> at <strong>Vodafone</strong>, and serve as an <em>Adjunct Professor of Cyber Security</em> at <strong>Koblenz University of Applied Sciences</strong>.</p> <p>My work contributed to industry projects at Meta, Telenor, and other companies, and protects billions of users worldwide. Additionally, I co-wrote the book <a href="https://protrain.github.io/">Programmieren trainieren</a> (Hanser Verlag).</p> </div> </div> <div class="row"> <div class="col bg-secondary pt-1 text-white"><h2>Research Interests</h2></div> </div> <div class="row py-2"> <div class="col"> <ul> <li><a href='https://riskbasedauthentication.org/' target="_blank">Risk-Based Authentication</a></li> <li>Usable Security and Privacy</li> <li>Cyber Security Education</li> <li>Mobile Authentication</li> <li>Usable Passwords</li> <li>Privacy Dashboards</li> <li>Developer-Centered Security</li> <li>Human-Computer-Interaction (HCI)</li> </ul> </div> </div> <div class="row"> <div class="col bg-secondary pt-1 text-white"><h2>Awards</h2></div> </div> <div class="row py-2"> <div class="col"> <div class="row mb-3"> <div class="col-2 col-sm-1 mt-1"> <img src="/assets/icons/badge.svg"> </div> <div class="col-10 col-sm-11"><span class="font-weight-bold">Top Talent FY23/24, Accelerated Talent FY24/25</span><br> <span class="text-muted">Granted by: Vodafone</span> </div> </div> <div class="row mb-3"> <div class="col-2 col-sm-1 mt-1"> <img src="/assets/icons/badge.svg"> </div> <div class="col-10 col-sm-11"><span class="font-weight-bold">Open Data Impact Award 2022</span><br> <span class="text-muted">Granted by: Stifterverband für die Deutsche Wissenschaft e.V.</span> </div> </div> <div class="row mb-3"> <div class="col-2 col-sm-1 mt-1"> <img src="/assets/icons/badge.svg"> </div> <div class="col-10 col-sm-11"><span class="font-weight-bold">Best ACSAC Video Production 2020</span><br> <span class="text-muted">Granted by: Annual Computer Security Applications Conference (ACSAC)</span> </div> </div> <div class="row mb-3"> <div class="col-2 col-sm-1 mt-1"> <img src="/assets/icons/badge.svg"> </div> <div class="col-10 col-sm-11"><span class="font-weight-bold">RISE Germany Scholarship 2019, 2020</span><br> <span class="text-muted">Granted by: German Academic Exchange Service (DAAD)</span> </div> </div> <div class="row mb-3"> <div class="col-2 col-sm-1 mt-1"> <img src="/assets/icons/badge.svg"> </div> <div class="col-10 col-sm-11"><span class="font-weight-bold">Best Graduate of the Year 2018/2019, Master Media Technology</span><br> <span class="text-muted">Granted by: TH Köln - University of Applied Sciences</span> </div> </div> </div> </div> <div class="row"> <div class="col bg-secondary pt-1 text-white"><h2>Education</h2></div> </div> <div class="row py-2"> <div class="col"> <div class="row mb-3"> <div class="col-2 col-sm-1 mt-1"> <img src="/assets/icons/cap.svg"> </div> <div class="col-10 col-sm-11"><span class="font-weight-bold">Computer Science (Dr.-Ing.)</span><br> <span class="text-muted">Ruhr University Bochum, Horst Görtz Institute for IT Security (2018 - 2023)</span><br> <span class="text-muted small">Reviewed by Markus Dürmuth, Martina Angela Sasse, and Luigi Lo Iacono</span><br> <a href="https://doi.org/10.13154/294-9901" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> Thesis </a> <a href="/slides/rba-thesis-defense23.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-picture'></i> Defense Slides </a> </div> </div> <div class="row mb-3"> <div class="col-2 col-sm-1 mt-1"> <img src="/assets/icons/cap.svg"> </div> <div class="col-10 col-sm-11"><span class="font-weight-bold">Certified Information Systems Security Professional (CISSP)</span><br> <span class="text-muted">International Information System Security Certification Consortium (2024)</span><br> </div> </div> <div class="row mb-3"> <div class="col-2 col-sm-1 mt-1"> <img src="/assets/icons/cap.svg"> </div> <div class="col-10 col-sm-11"><span class="font-weight-bold">Media Technology (M. Sc.)</span><br> <span class="text-muted">TH Köln - University of Applied Sciences (2015 - 2018)</span><br> </div> </div> <div class="row mb-3"> <div class="col-2 col-sm-1 mt-1"> <img src="/assets/icons/cap.svg"> </div> <div class="col-10 col-sm-11"><span class="font-weight-bold">Media Technology (B. Eng.)</span><br> <span class="text-muted">Cologne University of Applied Sciences (2011 - 2015)</span><br> </div> </div> </div> </div> <div class="row"> <div class="col bg-secondary pt-1 text-white"><h2>Selected Publications</h2></div> </div> <div class="row py-2"> <div class="col"><div class="container p-0 pb-3"><entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web</b> (<span itemprop="datePublished">2024</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Marian Hönscheid</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1145/3664476.3664478" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">ARES ’24</i></span>. <span itemprop="publisher">ACM</span>. </a> <br> <a href="/papers/http-client-hint-study-ares2024.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="article_ares2024_wieflinglinks" type="checkbox" class="links"> <label for="article_ares2024_wieflinglinks" class="btn btn-sm btn-outline-primary dropdown-toggle mt-2 mx-1" role="button" aria-label="Show more menu entries"> <i class='icon-plus'></i> More </label> <div class="contentLinks dropdown-menu p-1"> <a href="/slides/http-ch-crawling-ares24.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-picture'></i> Slides </a> <a href="https://riskbasedauthentication.org/state-of-practice/user-agent-client-hints/" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> </div> <input id="article_ares2024_wieflingtex" type="checkbox" class="bibtex"> <label for="article_ares2024_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_ares2024_wiefling,
author = {Wiefling, Stephan and Hönscheid, Marian and {Lo Iacono}, Luigi},
title = {A {Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web}},
booktitle = {19th {International} {Conference} on {Availability}, {Reliability} and {Security}},
series = {A{RES} '24},
location = {Vienna, Austria},
doi = {10.1145/3664476.3664478},
publisher = {ACM},
month = aug,
year = {2024},
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication</b> (<span itemprop="datePublished">2024</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Andre Büttner</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Andreas Thue Pedersen</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Nils Gruschka</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1007/978-981-97-1274-8_26" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">UbiSec ’23</i></span>. <span itemprop="publisher">Springer</span>. </a> <br> <a href="/papers/rbar-study-ubisec2023.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <a href="https://riskbasedauthentication.org/state-of-practice/account-recovery/" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> <input id="article_ubisec2023_buettnertex" type="checkbox" class="bibtex"> <label for="article_ubisec2023_buettnertex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_ubisec2023_buettner,
author = {Büttner, Andre and Pedersen, Andreas Thue and Wiefling, Stephan and Gruschka, Nils and {Lo Iacono}, Luigi},
title = {Is {It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication}},
booktitle = {Ubi{Sec} '23},
location = {Exeter, United Kingdom},
doi = {10.1007/978-981-97-1274-8_26},
publisher = {Springer},
month = mar,
year = {2024},
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example</b> (<span itemprop="datePublished">2023</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Vincent Unsel</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Nils Gruschka</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1145/3577923.3583634" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">CODASPY ’23</i></span>. <span itemprop="publisher">ACM</span>. </a> <br> <a href="/papers/rba-openstack-opensource-codaspy2023.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="article_codaspy2023_unsellinks" type="checkbox" class="links"> <label for="article_codaspy2023_unsellinks" class="btn btn-sm btn-outline-primary dropdown-toggle mt-2 mx-1" role="button" aria-label="Show more menu entries"> <i class='icon-plus'></i> More </label> <div class="contentLinks dropdown-menu p-1"> <a href="/slides/rba-openstack-codaspy23.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-picture'></i> Slides </a> <a href="https://riskbasedauthentication.org/opensource" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> </div> <input id="article_codaspy2023_unseltex" type="checkbox" class="bibtex"> <label for="article_codaspy2023_unseltex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_codaspy2023_unsel,
title = {Risk-{Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example}},
author = {Unsel, Vincent and Wiefling, Stephan and Gruschka, Nils and {Lo Iacono}, Luigi},
booktitle = {13th {ACM Conference on Data and Application Security and Privacy}},
year = {2023},
series = {C{ODASPY} '23},
location = {Charlotte, NC, USA},
publisher = {ACM},
doi = {10.1145/3577923.3583634},
month = apr,
year = {2023}
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">Data Protection Officers’ Perspectives on Privacy Challenges in Digital Ecosystems</b> (<span itemprop="datePublished">2023</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Jan Tolsdorf</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1007/978-3-031-25460-4_13" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">SPOSE ’22</i></span>. <span itemprop="publisher">Springer</span>. </a> <br> <a href="/papers/dpo-privacy-challenges-spose2022.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <a href="https://rdcu.be/dc3xs" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF [Publisher] </a> <input id="article_spose2022_wieflingtex" type="checkbox" class="bibtex"> <label for="article_spose2022_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_spose2022_wiefling,
author = {Wiefling, Stephan and Tolsdorf, Jan and Lo Iacono, Luigi},
title = {Data {Protection} {Officers}' {Perspectives} on {Privacy} {Challenges} in {Digital} {Ecosystems}},
booktitle = {4th {Workshop} on {Security}, {Privacy}, {Organizations}, and {Systems} {Engineering}},
series = {SPOSE '22},
location = {Copenhagen, Denmark},
doi = {10.1007/978-3-031-25460-4_13},
publisher = {Springer},
year = {2023}
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 article" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service</b> (<span itemprop="datePublished">2023</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Paul René Jørgensen</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Sigurd Thunem</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1145/3546069" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">ACM TOPS</i></span>. <span itemprop="publisher">ACM</span>. </a> <br> <a href="/papers/rba-largescale-onlineservice-tops2022.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="article_tops2023_wieflinglinks" type="checkbox" class="links"> <label for="article_tops2023_wieflinglinks" class="btn btn-sm btn-outline-primary dropdown-toggle mt-2 mx-1" role="button" aria-label="Show more menu entries"> <i class='icon-plus'></i> More </label> <div class="contentLinks dropdown-menu p-1"> <a href="/slides/rba-largescale-passwordscon23.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-picture'></i> Slides </a> <a href="https://riskbasedauthentication.org/analysis/largescale/" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> </div> <input id="article_tops2023_wieflingtex" type="checkbox" class="bibtex"> <label for="article_tops2023_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@article{article_tops2023_wiefling,
author = {Wiefling, Stephan and Jørgensen, Paul René and Thunem, Sigurd and {Lo Iacono}, Luigi},
title = {Pump {Up} {Password} {Security}! {Evaluating} and {Enhancing} {Risk}-{Based} {Authentication} on a {Real}-{World} {Large}-{Scale} {Online} {Service}},
journal = { {ACM} {Transactions} on {Privacy} and {Security}},
doi = {10.1145/3546069},
publisher = {ACM},
volume = {26},
number = {1},
articleno = {6},
issn = {2471-2566},
month = {feb},
year = {2023}
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">Privacy Considerations for Risk-Based Authentication Systems</b> (<span itemprop="datePublished">2021</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Jan Tolsdorf</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1109/EuroSPW54576.2021.00040" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">IWPE ’21</i></span>. <span itemprop="publisher">IEEE</span>. </a> <br> <a href="/papers/rba-privacy-iwpe2021.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="article_iwpe2021_wieflinglinks" type="checkbox" class="links"> <label for="article_iwpe2021_wieflinglinks" class="btn btn-sm btn-outline-primary dropdown-toggle mt-2 mx-1" role="button" aria-label="Show more menu entries"> <i class='icon-plus'></i> More </label> <div class="contentLinks dropdown-menu p-1"> <a href="/slides/rba-privacy-iwpe21.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-picture'></i> Slides </a> <a href="https://youtube.com/watch?v=WbeppxGKcog" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-videocam'></i> Talk </a> <a href="https://riskbasedauthentication.org/privacy/enhancements/" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> </div> <input id="article_iwpe2021_wieflingtex" type="checkbox" class="bibtex"> <label for="article_iwpe2021_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_iwpe2021_wiefling,
author = {Wiefling, Stephan and Tolsdorf, Jan and Lo Iacono, Luigi},
title = {Privacy {Considerations} for {Risk}-{Based} {Authentication} {Systems}},
booktitle = {2021 {International} {Workshop} on {Privacy} {Engineering}},
series = {IWPE '21},
location = {Vienna, Austria},
doi = {10.1109/EuroSPW54576.2021.00040},
pages = {320--327},
publisher = {IEEE},
month = sep,
year = {2021}
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">"I just looked for the solution!" - On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices</b> (<span itemprop="datePublished">2021</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Peter Leo Gorski</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Sebastian Möller</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1109/TSE.2021.3094171" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">IEEE TSE</i></span>. <span itemprop="publisher">IEEE</span>. </a> <br> <a href="/papers/csp-eyetracking-tse2021.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="journals_tse2021_gorskitex" type="checkbox" class="bibtex"> <label for="journals_tse2021_gorskitex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@article{journals_tse2021_gorski,
author = {Gorski, Peter Leo and Möller, Sebastian and Wiefling, Stephan and Lo Iacono, Luigi},
journal = {IEEE Transactions on Software Engineering},
title = {"I just looked for the solution!" - On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices},
year = {2021},
publisher = {IEEE},
doi = {10.1109/TSE.2021.3094171}
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 article" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">Verify It’s You: How Users Perceive Risk-based Authentication</b> (<span itemprop="datePublished">2021</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Markus Dürmuth</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1109/MSEC.2021.3077954" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">IEEE Security & Privacy</i></span>. <span itemprop="publisher">IEEE</span>. </a> <br> <a href="/papers/rba-perceptions-spm2021.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="journals_spm2021_wieflingtex" type="checkbox" class="bibtex"> <label for="journals_spm2021_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@article{journals_spm2021_wiefling,
title = {Verify {It}'s {You}: {How} {Users} {Perceive} {Risk}-based {Authentication}},
journal = {IEEE Security & Privacy},
author = {Wiefling, Stephan and Dürmuth, Markus and Lo Iacono, Luigi},
month = nov,
volume = {19},
number = {6},
pages = {47--57},
year = {2021},
publisher = {IEEE},
doi = {10.1109/MSEC.2021.3077954}
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">What’s in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics</b> (<span itemprop="datePublished">2021</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Markus Dürmuth</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1007/978-3-662-64331-0_19" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">FC ’21</i></span>. <span itemprop="publisher">Springer</span>. </a> <br> <a href="/papers/rba-characteristics-fc2021.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="article_fc2021_wieflinglinks" type="checkbox" class="links"> <label for="article_fc2021_wieflinglinks" class="btn btn-sm btn-outline-primary dropdown-toggle mt-2 mx-1" role="button" aria-label="Show more menu entries"> <i class='icon-plus'></i> More </label> <div class="contentLinks dropdown-menu p-1"> <a href="https://rdcu.be/cCsJu" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF [Publisher] </a> <a href="https://youtube.com/watch?v=WbeppxGKcog" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-videocam'></i> Talk </a> <a href="https://riskbasedauthentication.org/security/characteristics/" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> </div> <input id="article_fc2021_wieflingtex" type="checkbox" class="bibtex"> <label for="article_fc2021_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_fc2021_wiefling,
author = {Wiefling, Stephan and D\"{u}rmuth, Markus and Lo Iacono, Luigi},
title = {What’s in {Score} for {Website} {Users}: {A} {Data}-{Driven} {Long}-{Term} {Study} on {Risk}-{Based} {Authentication} {Characteristics}},
booktitle = {25th {International} {Conference} on {Financial} {Cryptography} and {Data} {Security} ({FC} '21)},
pages = {361--381},
location = {Grenada},
month = mar,
year = {2021}
publisher = {Springer},
doi = {10.1007/978-3-662-64331-0_19}
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication</b> (<span itemprop="datePublished">2020</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Markus Dürmuth</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1145/3427228.3427243" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">ACSAC ’20</i></span>. <span itemprop="publisher">ACM</span>. </a> <br> <a href="/papers/rba-perceptions-acsac2020.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="article_acsac2020_wieflinglinks" type="checkbox" class="links"> <label for="article_acsac2020_wieflinglinks" class="btn btn-sm btn-outline-primary dropdown-toggle mt-2 mx-1" role="button" aria-label="Show more menu entries"> <i class='icon-plus'></i> More </label> <div class="contentLinks dropdown-menu p-1"> <a href="https://dl.acm.org/doi/10.1145/3427228.3427243?cid=99659657309" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF [Publisher] </a> <a href="/slides/rba-perceptions-acsac20.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-picture'></i> Slides </a> <a href="https://www.youtube.com/watch?v=Rd4ah5LZKyc" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-videocam'></i> Talk </a> <a href="https://riskbasedauthentication.org/usability/perceptions/" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> </div> <input id="article_acsac2020_wieflingtex" type="checkbox" class="bibtex"> <label for="article_acsac2020_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_acsac2020_wiefling,
title = {More {Than} {Just} {Good} {Passwords}? A {Study} on {Usability} and {Security} {Perceptions} of {Risk-based} {Authentication}},
booktitle = {36th {Annual} {Computer} {Security} {Applications} {Conference} ({ACSAC} '20)},
author = {Wiefling, Stephan and D\"{u}rmuth, Markus and Lo Iacono, Luigi},
publisher = {ACM},
location = {Austin, USA},
month = dec,
year = {2020},
doi = {10.1145/3427228.3427243},
pages = {203--218},
isbn = {978-1-4503-8858-0/20/12},
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">Evaluation of Risk-based Re-Authentication Methods</b> (<span itemprop="datePublished">2020</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Tanvi Patil</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Markus Dürmuth</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1007/978-3-030-58201-2_19" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">IFIP SEC ’20</i></span>. <span itemprop="publisher">Springer</span>. </a> <br> <a href="/papers/rba-reauthentication-ifipsec2020.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="article_ifipsec2020_wieflinglinks" type="checkbox" class="links"> <label for="article_ifipsec2020_wieflinglinks" class="btn btn-sm btn-outline-primary dropdown-toggle mt-2 mx-1" role="button" aria-label="Show more menu entries"> <i class='icon-plus'></i> More </label> <div class="contentLinks dropdown-menu p-1"> <a href="https://rdcu.be/b8vta" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF [Publisher] </a> <a href="/slides/rba-reauth-ifipsec20.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-picture'></i> Slides </a> <a href="https://www.youtube.com/watch?v=Rd4ah5LZKyc" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-videocam'></i> Talk </a> <a href="https://riskbasedauthentication.org/usability/re-authentication/" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> </div> <input id="article_ifipsec2020_wieflingtex" type="checkbox" class="bibtex"> <label for="article_ifipsec2020_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_ifipsec2020_wiefling,
title = { {Evaluation} of {Risk-based} {Re}-{Authentication} {Methods}},
booktitle = {35th {IFIP} {TC}-11 {International} {Conference} on {Information} {Security} and {Privacy} {Protection} ({IFIP} {SEC} 2020)},
series = { {IFIP} {Advances} in {Information} and {Communication} {Technology}},
author = {Wiefling, Stephan and Patil, Tanvi and D\"{u}rmuth, Markus and Lo Iacono, Luigi },
publisher = {Springer International Publishing},
location = {Maribor, Slovenia},
volume = {580},
pages = {280--294},
isbn = {978-3-030-58200-5},
doi = {10.1007/978-3-030-58201-2_19},
month = sep,
year = {2020},
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">Even Turing Should Sometimes Not Be Able To Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services</b> (<span itemprop="datePublished">2019</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Nils Gruschka</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span>.</span> <a href="https://doi.org/10.1007/978-3-030-35055-0_12" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">NordSec ’19</i></span>. <span itemprop="publisher">Springer Nature</span>. </a> <br> <a href="/papers/hosit-tool-nordsec2019.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="article_nordsec2019_wieflinglinks" type="checkbox" class="links"> <label for="article_nordsec2019_wieflinglinks" class="btn btn-sm btn-outline-primary dropdown-toggle mt-2 mx-1" role="button" aria-label="Show more menu entries"> <i class='icon-plus'></i> More </label> <div class="contentLinks dropdown-menu p-1"> <a href="https://rdcu.be/bWIYW" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF [Publisher] </a> <a href="/slides/hosit-nordsec19.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-picture'></i> Slides </a> <a href="https://github.com/das-th-koeln/hosit" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> </div> <input id="article_nordsec2019_wieflingtex" type="checkbox" class="bibtex"> <label for="article_nordsec2019_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_nordsec2019_wiefling,
title = {Even {Turing} {Should} {Sometimes} {Not} {Be} {Able} {To} {Tell}: {Mimicking} {Humanoid} {Usage} {Behavior} for {Exploratory} {Studies} of {Online} {Services}},
booktitle = {24th {Nordic} {Conference} on {Secure} {IT} {Systems} ({NordSec} 2019)},
series = { {Lecture} {Notes} in {Computer} {Science}},
author = {Wiefling, Stephan and Gruschka, Nils and Lo Iacono, Luigi},
volume = {11875},
pages = {188--203},
isbn = {978-3-030-35055-0},
doi = {10.1007/978-3-030-35055-0_12},
publisher = {Springer Nature},
location = {Aalborg, Denmark},
month = nov,
year = {2019}
}</pre> </div> </div> </div> </entry> <entry> <div class="row"> <div class="col-2 col-sm-1 pt-4 mt-1"> <img src="/assets/icons/document.svg"> </div> <div class="col-10 col-sm-11 inproceedings" itemscope itemtype="http://schema.org/ScholarlyArticle" role="listitem"><span class="font-weight-bold"></span><br> <b itemprop="headline name">Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild</b> (<span itemprop="datePublished">2019</span>) <br> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Stephan Wiefling</span>, </span> <span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Luigi Lo Iacono</span></span> and<span itemscope itemprop="author" itemtype="http://schema.org/Person"> <span itemprop="name">Markus Dürmuth</span>.</span> <a href="https://doi.org/10.1007/978-3-030-22312-0_10" target="_blank"> <span itemprop="isPartOf" itemscope itemtype="http://schema.org/PublicationIssue"><i itemprop="name">IFIP SEC ’19</i></span>. <span itemprop="publisher">Springer</span>. </a> <br> <a href="/papers/rba-study-ifipsec2019.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF </a> <input id="article_ifipsec2019_wieflinglinks" type="checkbox" class="links"> <label for="article_ifipsec2019_wieflinglinks" class="btn btn-sm btn-outline-primary dropdown-toggle mt-2 mx-1" role="button" aria-label="Show more menu entries"> <i class='icon-plus'></i> More </label> <div class="contentLinks dropdown-menu p-1"> <a href="https://rdcu.be/b4Mwe" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-file-pdf'></i> PDF [Publisher] </a> <a href="/slides/rba-ifipsec19.pdf" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-picture'></i> Slides </a> <a href="https://www.youtube.com/watch?v=7hHD-Onx0gw" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-videocam'></i> Talk </a> <a href="https://riskbasedauthentication.org" target="_blank" class="btn btn-sm btn-outline-primary mx-1 my-1"> <i class='icon-globe'></i> Website </a> </div> <input id="article_ifipsec2019_wieflingtex" type="checkbox" class="bibtex"> <label for="article_ifipsec2019_wieflingtex" class="btn btn-sm btn-outline-primary mt-2 mx-1" role="button" aria-label="Show Bibtex citation code"> <i class='icon-quote-left'></i> Bibtex </label> <div class="content card bg-light"> <pre class="card-body bibtex">@inproceedings{article_ifipsec2019_wiefling,
title = {Is {This} {Really} {You}? {An} {Empirical} {Study} on {Risk}-{Based} {Authentication} {Applied} in the {Wild}},
booktitle = {34th {IFIP} {TC}-11 {International} {Conference} on {Information} {Security} and {Privacy} {Protection} ({IFIP} {SEC} 2019)},
series = { {IFIP} {Advances} in {Information} and {Communication} {Technology}},
author = {Wiefling, Stephan and Lo Iacono, Luigi and D\"{u}rmuth, Markus},
volume = {562},
pages = {134--148},
isbn = {978-3-030-22311-3},
doi = {10.1007/978-3-030-22312-0_10},
publisher = {Springer International Publishing},
location = {Lisbon, Portugal},
month = jun,
year = {2019}
}
</pre> </div> </div> </div> </entry></div></div> </div> </div> </div> </main> </div> </body> </html>