Home | english  | Impressum | Datenschutz | Sitemap | KIT
Kontakt

KIT Campus Süd
Kollegiengebäude am Kronenplatz (Geb. 05.20)
Kaiserstr. 89
76133 Karlsruhe

   

Newsletter abbonieren
YouTube abonnieren

Externe Veranstaltungen
Dienstag, 08.Jan 2019
HICSS 2018
Sonntag, 24.Feb 2019
USEC 2019
Montag, 08.Apr 2019
SAC 2019

Weitere Veranstaltungen...

KASTEL

Karlsruher IT-Sicherheitsinitiative

Peter Mayer, M. Sc.

Peter Mayer, M. Sc.

Gruppe: SECUSO
Sprechstunden: n.V.
Raum: 5C-03.2
CS 05.20

Tel.: +49 721 608-46038
peter mayerVwv9∂kit edu


Contact

PGP-Key: Key
Fingerprint: 50BF A9C0 4DAF 2A3A E4E4 9A1A 2AC5 5373 4687 FF06

S/MIME-Certificate: Certificate

Curriculum Vitae

Peter Mayer is a doctoral researcher in the SECUSO Research Group of Prof. Dr. Melanie Volkamer at Karlsruhe Institute of Technology. His research focuses on security awareness and education, usable authentication, and password managers. Having obtained his Bachelor's degree from Technische Universität Darmstadt in 2012, he graduated from Technische Universität Darmstadt with a Master's degree in IT-Security in 2014.

Research Interests

  • Usable Authentication
  • Password Managers
  • Applied Cryptography
  • Security Awareness

Research Projects

Teaching

  • WS 2018: Sicherheit (programming lab)
  • WS 2018: Security, Usability, Society (Praktikum zur Vorlesung Informationssicherheit)
  • SS 2018: Informationssicherheit (lecture), Praktikum Privacy Friendly Apps (programming lab), Seminar Betriebliche Informationssysteme: Datenschutz und IT-Sicherheit (seminar)
  • WS 2017: Usable Security and Privacy (programming lab)
  • SS 2017: Human Factors in Security (lecture at Karlstad University, Sweden)
  • SS 2017: Usable Security and Privacy (programming lab)
  • WS 2016/2017: Usable Security and Privacy (programming lab)
  • SS 2016: Usable Security and Privacy (programming lab)
  • WS 2015/2016: Einführung in Trusted Systems / Computer Security
  • WS 2015/2016: Usable Security and Privacy (programming lab)
  • SS 2015: Einführung in Trusted Systems (lecture)

Scientific Services

Reviewing Activities

  • ECIS (2018)
  • Ifip SEC (2015)
  • USEC (2015, 2016, 2017)
  • Journal of Information Security and Applications (2017)
  • IEEE Transactions on Information Forensics & Security (2017)
  • International Journal of Human-Computer Studies (2018)

Program Commitee Memberships

  • Mensch und Computer 2015 / Workshop "Usable Security" (2015)

Talks

Sensibilisierungsforschung: Wie erreichen Sie die Kolleginnen und Kollegen nachhaltig und effektiv?
In: IT-SIBe Jahrestagung - Brühl, Germany
10th September 2018

Schutz vor Phishing mit NoPhish
In: Wissenschaftstag „Sicherheit und Datenschutz im Internet“ - Darmstadt, Germany
18th September 2017

Human Factors in IT Security
In: secUnity International Summer Schooon „Economics of IT Security and Privacy“
8th
 August 2017

Phishing und andere betrügersiche Nachrichten
In: Safer Internet Day an der VHS Fulda - Fulda, Germany
7th
 February 2017

Enabling Automatic Password Change in Password Managers Through Crowdsourcing
In: International Conference on Passwords - Bochum, Germany
6th December 2016 (watch it online)

Graphische Passwörter als Alternative zu Textpasswörtern?
In: Usable Security Day - Darmstadt, Germany
16th July 2015

Publikationen


2018
Assistance in Daily Password Generation Tasks [in press].
Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V.
2018. Proceedings of the 3rd International Workshop on Ubiquitous Personal Assistance, Singapore, 8th October 2018
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials [in press].
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC 2018 : Computer Security Applications Conference, San Juan, Puerto Rico, USA, 3rd - 7th Dec, 2018. doi:10.1145/3274694.3274747
ACCESSv2: A Collaborative Authentication Research and Decision Support Platform.
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
The Quest to Replace Passwords Revisited - Rating Authentication Schemes [in press].
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. International Symposium on Human Aspects of Information Security Assurance, Dundee, United Kingdom, August 29 - 31, 2018, 38–48
Motivating Users to Consider Recommendations on Password Management Strategies [in press].
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37
Phishing Detection: Developing and Evaluating a Five Minutes Security Awareness Video [in press].
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business - TrustBus 2018, Regensburg, 5.-6. September 2018
Addressing Misconceptions About Password Security Effectively.
Mayer, P.; Volkamer, M.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018 Posters), Baltimore, MD, USA, 12.–14.08.2018
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Kulyk, O.; Mayer, P.; KäferO.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, IEEE, Piscataway, NJ. doi:10.1109/TrustCom/BigDataSE.2018.00148
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Volkamer, M.; Gutmann, A.; Renaud, K.; Gerber, P.; Mayer, P.
2018. Fourteenth Symposium on Usable Privacy and Security (SOUPS), Baltimore, MD, USA, August 12–14, 2018, USENIX Association, Berkeley (CA)
Human Factors in Security.
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Springer Vieweg, Wiesbaden. doi:10.1007/978-3-658-19523-6_5
2017
Analysis of the Security and Memorability of the Password Card.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. ACSAC 2017, Orlando, FL, December 4–8, 2017
Addressing Misconceptions About Password Security Effectively [in press].
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, ACM. doi:10.1145/3167996.3167998
Reliable Behavioural Factors in the Information Security Context.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, ACM, New York (NY). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc., Berkeley (CA)
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Poster: Secure Storage of Masked Password.
Mayer, P.; Volkamer, M.
2017. 2nd IEEE European Symposium on Security and Privacy, Paris, F, April 26-28, 2017
2016
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, ACM, New York, NY. doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer, Cham
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth, Plymouth
Teaching Phishing-Security: Which Way is Best?.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer, Cham. doi:10.1007/978-3-319-33630-5_10
ZeTA-zero-trust authentication: Relying on innate human ability, not technology.
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, IEEE, Piscataway, NJ. doi:10.1109/EuroSP.2016.35
2015
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, ACM. doi:10.1145/2818000.2818043
2014
Authentication Schemes - Comparison and Effective Password Spaces.
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer, Cham. doi:10.1007/978-3-319-13841-1_12
2013
Are Graphical Authentication Mechanisms As Strong As Passwords?.
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, IEEE, Piscataway, NJ