What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Katharina Krombholz
Google Scholar
36
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Analyzing the iOS Local Network Permission from a Technical and User Perspective.
David Schmidt
Alexander Ponticello
Magdalena Steinböck
Katharina Krombholz
Martina Lindorfer
2025
conf/uss
AirTag-Facilitated Stalking Protection: Evaluating Unwanted Tracking Notifications and Tracker Locating Features.
Dañiel Gerhardt
Matthias Fassl
Carolyn Guthoff
Adrian Dabrowski
Katharina Krombholz
2025
conf/uss
Understanding How Users Prepare for and React to Smartphone Theft.
Divyanshu Bhardwaj
Sumair Ijaz Hashmi
Katharina Krombholz
Maximilian Golla
2024
conf/uss
Towards Privacy and Security in Private Clouds: A Representative Survey on the Prevalence of Private Hosting and Administrator Characteristics.
Lea Gröber
Simon Lenau
Rebecca Weil
Elena Groben
Michael Schilling
Katharina Krombholz
2024
conf/uss
Trust Me If You Can - How Usable Is Trusted Types In Practice?
Sebastian Roth
Lea Gröber
Philipp Baus
Katharina Krombholz
Ben Stock
2024
conf/uss
"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators.
Lea Gröber
Waleed Arshad
Shanza
Angelica Goetzen
Elissa M. Redmiles
Maryam Mustafa
Katharina Krombholz
2024
conf/acns
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures.
H. T. M. A. Riyadh
Divyanshu Bhardwaj
Adrian Dabrowski
Katharina Krombholz
2023
journals/tifs
Machine Learning Security in Industry: A Quantitative Survey.
Kathrin Grosse
Lukas Bieringer
Tarek R. Besold
Battista Biggio
Katharina Krombholz
2023
conf/ccs
Pakistani Teens and Privacy - How Gender Disparities, Religion and Family Values Impact the Privacy Design Space.
Maryam Mustafa
Abdul Moeed Asad
Shehrbano Hassan
Urooj Haider
Zainab Durrani
Katharina Krombholz
2023
conf/uss
Investigating Verification Behavior and Perceptions of Visual Digital Certificates.
Dañiel Gerhardt
Alexander Ponticello
Adrian Dabrowski
Katharina Krombholz
2023
conf/uss
To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation, Operation, and Security Mindset.
Lea Gröber
Rafael Mrowczynski
Nimisha Vijay
Daphne A. Muller
Adrian Dabrowski
Katharina Krombholz
2023
conf/sp
Perceptions of Distributed Ledger Technology Key Management - An Interview Study with Finance Professionals.
Carolyn Guthoff
Simon Anell
Johann Hainzinger
Adrian Dabrowski
Katharina Krombholz
2022
conf/uss
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context.
Veroniek Binkhorst
Tobias Fiebig
Katharina Krombholz
Wolter Pieters
Katsiaryna Labunets
2022
conf/soups
Replication: Stories as Informal Lessons about Security.
Katharina Pfeffer
Alexandra Mai
Edgar R. Weippl
Emilee Rader
Katharina Krombholz
2022
conf/soups
Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.
Matthias Fassl
Simon Anell
Sabine Houy
Martina Lindorfer
Katharina Krombholz
2022
conf/soups
Industrial practitioners' mental models of adversarial machine learning.
Lukas Bieringer
Kathrin Grosse
Michael Backes
Battista Biggio
Katharina Krombholz
2021
conf/ccs
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP.
Sebastian Roth
Lea Gröber
Michael Backes
Katharina Krombholz
Ben Stock
2021
conf/uss
On the Usability of Authenticity Checks for Hardware Security Tokens.
Katharina Pfeffer
Alexandra Mai
Adrian Dabrowski
Matthias Gusenbauer
Philipp Schindler
Edgar R. Weippl
Michael Franz
Katharina Krombholz
2021
conf/soups
Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.
Alexander Ponticello
Matthias Fassl
Katharina Krombholz
2021
conf/esorics
Transferring Update Behavior from Smartphones to Smart Consumer Devices.
Matthias Fassl
Michaela Neumayr
Oliver Schedler
Katharina Krombholz
2020
conf/ccs
VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
Sahar Abdelnabi
Katharina Krombholz
Mario Fritz
2020
conf/soups
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.
Alexandra Mai
Katharina Pfeffer
Matthias Gusenbauer
Edgar R. Weippl
Katharina Krombholz
2020
conf/soups
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators.
Christian Tiefenau
Maximilian Häring
Katharina Krombholz
Emanuel von Zezschwitz
2020
conf/eurosp
End User and Expert Perceptions of Threats and Potential Countermeasures.
Simon Anell
Lea Gröber
Katharina Krombholz
2020
conf/eurosp
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
Karoline Busse
Mohammad Tahaei
Katharina Krombholz
Emanuel von Zezschwitz
Matthew Smith
Jing Tian
Wenyuan Xu
2019
conf/ccs
Poster: Let History not Repeat Itself (this Time) - Tackling WebAuthn Developer Issues Early On.
Aftab Alam
Katharina Krombholz
Sven Bugiel
2019
conf/ccs
A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
Christian Tiefenau
Emanuel von Zezschwitz
Maximilian Häring
Katharina Krombholz
Matthew Smith
2019
conf/sp
"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
Katharina Krombholz
Karoline Busse
Katharina Pfeffer
Matthew Smith
Emanuel von Zezschwitz
2018
conf/ccs
Investigating System Operators' Perspective on Security Misconfigurations.
Constanze Dietrich
Katharina Krombholz
Kevin Borgolte
Tobias Fiebig
2017
conf/uss
"I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS.
Katharina Krombholz
Wilfried Mayer
Martin Schmiedecker
Edgar R. Weippl
2016
conf/fc
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy.
Katharina Krombholz
Aljosha Judmayer
Matthias Gusenbauer
Edgar R. Weippl
2016
conf/soups
Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices.
Katharina Krombholz
Thomas Hupperich
Thorsten Holz
2016
conf/soups
Who Are You Now? Fading to Multiple Personas.
Sven Dietrich
Michael Brenner
Katharina Krombholz
2015
journals/istr
Advanced social engineering attacks.
Katharina Krombholz
Heidelinde Hobel
Markus Huber
Edgar R. Weippl
2015
conf/fc
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing.
Katharina Krombholz
Adrian Dabrowski
Matthew Smith
Edgar R. Weippl
2014
conf/ccs
QR Inception: Barcode-in-Barcode Attacks.
Adrian Dabrowski
Katharina Krombholz
Johanna Ullrich
Edgar R. Weippl
Coauthors
Abdul Moeed Asad
(1)
Adrian Dabrowski
(8)
Aftab Alam
(1)
Alexander Ponticello
(3)
Alexandra Mai
(3)
Aljosha Judmayer
(1)
Angelica Goetzen
(1)
Battista Biggio
(2)
Ben Stock
(2)
Carolyn Guthoff
(2)
Christian Tiefenau
(2)
Constanze Dietrich
(1)
Dañiel Gerhardt
(2)
Daphne A. Muller
(1)
David Schmidt
(1)
Divyanshu Bhardwaj
(2)
Edgar R. Weippl
(8)
Elena Groben
(1)
Elissa M. Redmiles
(1)
Emanuel von Zezschwitz
(4)
Emilee Rader
(1)
H. T. M. A. Riyadh
(1)
Heidelinde Hobel
(1)
Jing Tian
(1)
Johann Hainzinger
(1)
Johanna Ullrich
(1)
Karoline Busse
(2)
Katharina Krombholz
(36)
Katharina Pfeffer
(4)
Kathrin Grosse
(2)
Katsiaryna Labunets
(1)
Kevin Borgolte
(1)
Lea Gröber
(6)
Lukas Bieringer
(2)
Magdalena Steinböck
(1)
Mario Fritz
(1)
Markus Huber
(1)
Martin Schmiedecker
(1)
Martina Lindorfer
(2)
Maryam Mustafa
(2)
Matthew Smith
(4)
Matthias Fassl
(4)
Matthias Gusenbauer
(3)
Maximilian Golla
(1)
Maximilian Häring
(2)
Michael Backes
(2)
Michael Brenner
(1)
Michael Franz
(1)
Michael Schilling
(1)
Michaela Neumayr
(1)
Mohammad Tahaei
(1)
Nimisha Vijay
(1)
Oliver Schedler
(1)
Philipp Baus
(1)
Philipp Schindler
(1)
Rafael Mrowczynski
(1)
Rebecca Weil
(1)
Sabine Houy
(1)
Sahar Abdelnabi
(1)
Sebastian Roth
(2)
Shanza
(1)
Shehrbano Hassan
(1)
Simon Anell
(3)
Simon Lenau
(1)
Sumair Ijaz Hashmi
(1)
Sven Bugiel
(1)
Sven Dietrich
(1)
Tarek R. Besold
(1)
Thomas Hupperich
(1)
Thorsten Holz
(1)
Tobias Fiebig
(2)
Urooj Haider
(1)
Veroniek Binkhorst
(1)
Waleed Arshad
(1)
Wenyuan Xu
(1)
Wilfried Mayer
(1)
Wolter Pieters
(1)
Zainab Durrani
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to