default search action
Stephan Wiefling
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2023
- [b1]Stephan Wiefling:
Usability, security, and privacy of risk-based authentication. Ruhr University Bochum, Germany, 2023
Journal Articles
- 2023
- [j4]Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono:
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. ACM Trans. Priv. Secur. 26(1): 6:1-6:36 (2023) - 2022
- [j3]Peter Leo Gorski, Sebastian Möller, Stephan Wiefling, Luigi Lo Iacono:
"I just looked for the solution!"On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices. IEEE Trans. Software Eng. 48(9): 3467-3484 (2022) - 2021
- [j2]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
Verify It's You: How Users Perceive Risk-Based Authentication. IEEE Secur. Priv. 19(6): 47-57 (2021) - 2017
- [j1]Stephan Wiefling, Luigi Lo Iacono, Frederik Sandbrink:
Anwendung der Blockchain außerhalb von Geldwährungen. Datenschutz und Datensicherheit 41(8): 482-486 (2017)
Conference and Workshop Papers
- 2024
- [c13]Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono:
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web. ARES 2024: 4:1-4:12 - 2023
- [c12]Vincent Unsel, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example. CODASPY 2023: 237-243 - [c11]Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication. UbiSec 2023: 401-419 - 2022
- [c10]Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Data Protection Officers' Perspectives on Privacy Challenges in Digital Ecosystems. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 228-247 - 2021
- [c9]Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Privacy Considerations for Risk-Based Authentication Systems. EuroS&P Workshops 2021: 320-327 - [c8]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
What's in Score for Website Users: A Data-Driven Long-Term Study on Risk-Based Authentication Characteristics. Financial Cryptography (2) 2021: 361-381 - [c7]Johannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono:
Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication. Open Identity Summit 2021: 59-70 - 2020
- [c6]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication. ACSAC 2020: 203-218 - [c5]Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono:
Evaluation of Risk-Based Re-Authentication Methods. SEC 2020: 280-294 - [c4]Stephan Wiefling:
Usability, Sicherheit und Privatsphäre von risikobasierter Authentifizierung. Sicherheit 2020: 129-134 - 2019
- [c3]Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services. NordSec 2019: 188-203 - [c2]Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth:
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. SEC 2019: 134-148 - 2018
- [c1]Peter Leo Gorski, Luigi Lo Iacono, Stephan Wiefling, Sebastian Möller:
Warn if Secure or How to Deal with Security by Default in Software Development?. HAISA 2018: 170-190
Informal and Other Publications
- 2024
- [i10]Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication. CoRR abs/2403.11798 (2024) - [i9]Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono:
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web. CoRR abs/2405.13744 (2024) - 2023
- [i8]Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono:
Privacy Considerations for Risk-Based Authentication Systems. CoRR abs/2301.01505 (2023) - [i7]Vincent Unsel, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example. CoRR abs/2303.12361 (2023) - 2022
- [i6]Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono:
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. CoRR abs/2206.15139 (2022) - 2021
- [i5]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics. CoRR abs/2101.10681 (2021) - [i4]Johannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono:
Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication. CoRR abs/2105.12477 (2021) - 2020
- [i3]Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth:
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild. CoRR abs/2003.07622 (2020) - [i2]Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono:
Evaluation of Risk-based Re-Authentication Methods. CoRR abs/2008.07795 (2020) - [i1]Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication. CoRR abs/2010.00339 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint