The other side of the coin: User experiences with bitcoin security and privacy K Krombholz, A Judmayer, M Gusenbauer, E Weippl International Conference on Financial Cryptography and Data Security, 555-580, 2016 | 197 | 2016 |
User mental models of cryptocurrency systems-a grounded theory approach A Mai, K Pfeffer, M Gusenbauer, E Weippl, K Krombholz Sixteenth symposium on usable privacy and security (SOUPS 2020), 341-358, 2020 | 69 | 2020 |
On the usability of authenticity checks for hardware security tokens K Pfeffer, A Mai, A Dabrowski, M Gusenbauer, P Schindler, E Weippl, ... 30th USENIX Security Symposium (USENIX Security 21), 37-54, 2021 | 19 | 2021 |
Cyber-Sicherheitsstrategien—Umsetzung von Zielen durch Kooperation B Pospisil, M Gusenbauer, E Huber, O Hellwig Datenschutz und Datensicherheit-DuD 41, 628-632, 2017 | 6 | 2017 |
A GDPR compliance module for supporting the exchange of information between CERTs O Hellwig, G Quirchmayr, W Hötzendorfer, C Tschohl, E Huber, F Vock, ... Proceedings of the 13th International Conference on Availability …, 2018 | 5 | 2018 |
Für bare Münze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin K Krombholz, A Judmayer, M Gusenbauer, E Weippl Gesellschaft für Informatik eV, 2016 | 1 | 2016 |
Bitstream-Top-Down/Bottom-Up Data Processing for Interactive Bitcoin Visualization. M Gusenbauer | | 2018 |
Bitstream: eine bottom-up/top-down Methode für intteraktive Bitcoin-Visualisierungen: a bottom-up/top-down approxach to data loading for interactive bitcoin visualizations M Gusenbauer Wien, 2018 | | 2018 |
Design of HELIOS, a Network Anomaly Visualization Tool M Gusenbauer, R Fontugne, J Mazel, K Fukuda IEICE Conferences Archives, 2016 | | 2016 |
BS-3-14 Design of HELIOS, a Network Anomaly Visualization Tool (BS-3. Advanced Networking Technologies for Innovative Information Networks) G Matthias, F Romain, M Johan, F Kensuke 電子情報通信学会総合大会講演論文集 2016 (2), " S-38"-" S-39", 2016 | | 2016 |
A Novel Mapping of Arbitrary Precision Integer Operations to the GPU M Gusenbauer Technische Universität Wien, 2015 | | 2015 |
On the Usability of Authenticity Checks for Hardware Security Tokens M Gusenbauer, P Schindler, E Weippl, M Franz, K Krombholz | | |