Home | english  | Impressum | Datenschutz | Sitemap | KIT
Kontakt

KIT Campus Süd
Kollegiengebäude am Kronenplatz (Geb. 05.20)
Kaiserstr. 89
76133 Karlsruhe

  

Newsletter abbonieren
YouTube abonnieren

SECUSO Events
Dienstag, 01. Okt 2019
E-Vote-ID 2019
Sonntag, 03. Nov 2019
Dagstuhl Seminar: Biggest Failures in Security

Weitere Veranstaltungen...
Externe Veranstaltungen
Dienstag, 16. Jul 2019
PETS 2019
Sonntag, 11. Aug 2019
SOUPS 2019
Montag, 26. Aug 2019
ARES 2019

Weitere Veranstaltungen...

KASTEL

Karlsruher IT-Sicherheitsinitiative

Peter Mayer, M. Sc.

Peter Mayer, M. Sc.

Gruppe: SECUSO
Sprechstunden: n.V.
Raum: 5C-03.2
CS 05.20

Tel.: +49 721 608-46038
peter mayerPpi7∂kit edu


Contact

PGP-Key: Key
Fingerprint: 50BF A9C0 4DAF 2A3A E4E4 9A1A 2AC5 5373 4687 FF06

S/MIME-Certificate: Certificate

Curriculum Vitae

Peter Mayer is a doctoral researcher in the SECUSO Research Group of Prof. Dr. Melanie Volkamer at Karlsruhe Institute of Technology. His research focuses on security awareness and education, usable authentication, and password managers. Having obtained his Bachelor's degree from Technische Universität Darmstadt in 2012, he graduated from Technische Universität Darmstadt with a Master's degree in IT-Security in 2014.

Research Interests

  • Usable Authentication
  • Password Managers
  • Applied Cryptography
  • Security Awareness

Research Projects

Teaching

  • WS 2018: Sicherheit (programming lab)
  • WS 2018: Security, Usability, Society (Praktikum zur Vorlesung Informationssicherheit)
  • SS 2018: Informationssicherheit (lecture), Praktikum Privacy Friendly Apps (programming lab), Seminar Betriebliche Informationssysteme: Datenschutz und IT-Sicherheit (seminar)
  • WS 2017: Usable Security and Privacy (programming lab)
  • SS 2017: Human Factors in Security (lecture at Karlstad University, Sweden)
  • SS 2017: Usable Security and Privacy (programming lab)
  • WS 2016/2017: Usable Security and Privacy (programming lab)
  • SS 2016: Usable Security and Privacy (programming lab)
  • WS 2015/2016: Einführung in Trusted Systems / Computer Security
  • WS 2015/2016: Usable Security and Privacy (programming lab)
  • SS 2015: Einführung in Trusted Systems (lecture)

Scientific Services

Reviewing Activities

  • ECIS (2018)
  • ICIS (2019)
  • Ifip SEC (2015)
  • USEC (2015, 2016, 2017)
  • IEEE Transactions on Information Forensics & Security (2017)
  • International Journal of Human-Computer Studies (2018, 2019)
  • Journal of Information Security and Applications (2017, 2019)

Program Commitee Memberships

  • Mensch und Computer 2015 / Workshop "Usable Security" (2015)
  • EuroUSEC (2019)
  • WAY (2019)

Organiszing Commitee Memberships

  • ACSAC (2019)

Talks (beside conferences)

Sensibilisierungsforschung: Wie erreichen Sie die Kolleginnen und Kollegen nachhaltig und effektiv?
In: IT-SIBe Jahrestagung - Brühl, Germany
10th September 2018

Schutz vor Phishing mit NoPhish
In: Wissenschaftstag „Sicherheit und Datenschutz im Internet“ - Darmstadt, Germany
18th September 2017

Human Factors in IT Security
In: secUnity International Summer Schooon „Economics of IT Security and Privacy“
8th
 August 2017

Phishing und andere betrügersiche Nachrichten
In: Safer Internet Day an der VHS Fulda - Fulda, Germany
7th
 February 2017

Enabling Automatic Password Change in Password Managers Through Crowdsourcing
In: International Conference on Passwords - Bochum, Germany
6th December 2016 (watch it online)

Graphische Passwörter als Alternative zu Textpasswörtern?
In: Usable Security Day - Darmstadt, Germany
16th July 2015

Publikationen


2019
I (don’t) see what you typed there! Shoulder-surfing resistant password entry on gamepads.
Mayer, P.; Gerber, N.; Reinheimer, B.; Rack, P.; Braun, K.; Volkamer, M.
2019. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Paper 549, ACM, New York. doi:10.1145/3290605.3300779
2018
Analyse der Sicherheit und Erinnerbarkeit der DsiN-Passwortkarte.
Mayer, P.; Kunz, A.; Volkamer, M.
2018. Datenschutz und Datensicherheit, 42 (5), 307–310. doi:10.1007/s11623-018-0946-9
Assistance in Daily Password Generation Tasks.
Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V.
2018. 2018 Joint ACM International Conference on Pervasive and Ubiquitous Computing, UbiComp 2018 and 2018 ACM International Symposium on Wearable Computers, ISWC 2018; Singapore; Singapore; 8 October 2018 through 12 October 2018, 786–793, ACM Press, New York (NY). doi:10.1145/3267305.3274127
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials [in press].
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC 2018 : Computer Security Applications Conference, San Juan, Puerto Rico, USA, 3rd - 7th Dec, 2018. doi:10.1145/3274694.3274747
ACCESSv2: A Collaborative Authentication Research and Decision Support Platform.
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
The Quest to Replace Passwords Revisited - Rating Authentication Schemes.
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. Proceedings of the 12th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2018), Dundee, UK, August 29 - 31, 2018. Ed.: N. Clarke, 38–48, Centre for Security, Communications and Network Research, University of Plymouth, UK
Motivating Users to Consider Recommendations on Password Management Strategies [in press].
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37
Developing and Evaluating a Five Minute Phishing Awareness Video.
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Trust, Privacy and Security in Digital Business - 15th International Conference (TrustBus 2018), Regensburg, Germany, September 5–6, 2018. Ed.: S. Furnell, 119–134, Springer, Cham
Addressing Misconceptions About Password Security Effectively.
Mayer, P.; Volkamer, M.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018 Posters), Baltimore, MD, USA, 12.–14.08.2018
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Kulyk, O.; Mayer, P.; KäferO.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, IEEE, Piscataway, NJ. doi:10.1109/TrustCom/BigDataSE.2018.00148
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, USA, August 12–14, 2018, USENIX Association, Berkeley (CA)
Human Factors in Security.
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Springer Vieweg, Wiesbaden. doi:10.1007/978-3-658-19523-6_5
2017
Analysis of the Security and Memorability of the Password Card.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. ACSAC 2017, Orlando, FL, December 4–8, 2017
Addressing Misconceptions About Password Security Effectively.
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, 16–27, ACM. doi:10.1145/3167996.3167998
Reliable Behavioural Factors in the Information Security Context.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, ACM, New York (NY). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc., Berkeley (CA)
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Poster: Secure Storage of Masked Password.
Mayer, P.; Volkamer, M.
2017. 2nd IEEE European Symposium on Security and Privacy, Paris, F, April 26-28, 2017
2016
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, ACM, New York, NY. doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer, Cham
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth, Plymouth
Teaching Phishing-Security: Which Way is Best?.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer, Cham. doi:10.1007/978-3-319-33630-5_10
ZeTA-zero-trust authentication: Relying on innate human ability, not technology.
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, IEEE, Piscataway, NJ. doi:10.1109/EuroSP.2016.35
2015
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, ACM. doi:10.1145/2818000.2818043
2014
Authentication Schemes - Comparison and Effective Password Spaces.
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer, Cham. doi:10.1007/978-3-319-13841-1_12
2013
Are Graphical Authentication Mechanisms As Strong As Passwords?.
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, IEEE, Piscataway, NJ