| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | A* | conf |
CHI
|
| 2025 | C | conf |
NSPW
|
| 2022 | — | conf |
ICSE (SEET)
|
| 2021 | — | conf |
EuroUSEC
|
| 2020 | — | conf |
DETIPS/DeSECSys/MPS/SPOSE@ESORICS
|
| 2020 | J | jnl |
Datenschutz und Datensicherheit
|
| 2018 | J | jnl |
J. Inf. Secur. Appl.
|
| 2016 | — | conf |
WIFS
|
| 2015 | J | jnl |
CoRR
|
| 2015 | — | conf |
HCI (22)
|
| 2014 | A | conf |
RE
|
| 2014 | C | conf |
PST
|
| 2014 | J | jnl |
IEEE Secur. Priv.
|
| 2014 | J | jnl |
IEEE Secur. Priv.
|
| 2014 | J | jnl |
Dagstuhl Reports
|
| 2014 | — | conf |
HCI (19)
|
| 2014 | — | conf |
HCI (24)
|
| 2013 | — | conf |
Financial Cryptography Workshops
|
| 2013 | — | conf |
TRUST
|
| 2013 | — | conf |
"Technology Should Be Smarter Than This!": A Vision for Overcoming the Great Authentication Fatigue.
Secure Data Management
|
| 2013 | J | jnl |
Dagstuhl Reports
|
| 2013 | — | conf |
Digital Identity Management
|
| 2013 | — | conf |
ECIS
|
| 2012 | C | conf |
CRiSIS
|
| 2012 | Misc | conf |
SAC
|
| 2012 | — | ch. |
European Data Protection
|
| 2012 | — | ch. |
European Data Protection
|
| 2012 | C | conf |
NSPW
|
| 2012 | J | jnl |
IEEE Secur. Priv.
|
| 2012 | A* | conf |
CHI
|
| 2012 | — | conf |
BCS HCI
|
| 2012 | — | conf |
TRUST
|
| 2011 | A* | conf |
CHI
|
| 2011 | — | conf |
IFIPTM
|
| 2011 | — | conf |
STAST
|
| 2011 | B | conf |
NSS
|
| 2011 | — | conf |
TRUST
|
| 2010 | C | conf |
NSPW
|
| 2010 | — | conf |
BCS HCI
|
| 2010 | J | jnl |
Commun. ACM
|
| 2010 | A* | conf |
CHI
|
| 2009 | A | conf |
SOUPS
|
| 2009 | — | conf |
BCS HCI
|
| 2009 | J | jnl |
Int. J. Hum. Comput. Stud.
|
| 2009 | J | jnl |
ACM Trans. Multim. Comput. Commun. Appl.
|
| 2008 | A | conf |
SOUPS
|
| 2008 | J | jnl |
Multim. Tools Appl.
|
| 2008 | C | conf |
NSPW
|
| 2008 | A* | conf |
ACM Multimedia
|
| 2008 | A* | conf |
ACM Multimedia
|
| 2007 | — | conf |
BCS HCI (1)
|
| 2007 | — | conf |
BCS HCI (2)
|
| 2007 | — | conf |
BCS HCI (2)
|
| 2007 | J | jnl |
Int. J. Electron. Secur. Digit. Forensics
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2007 | A* | conf |
ACM Multimedia
|
| 2007 | — | conf |
Usability is the best policy: public policy and the lived experience of transport systems in London.
BCS HCI (1)
|
| 2006 | A* | conf |
CHI
|
| 2006 | Misc | conf |
MuC
|
| 2006 | A* | conf |
ACM Multimedia
|
| 2005 | J | jnl |
Softw. Pract. Exp.
|
| 2005 | A* | conf |
ACM Multimedia
|
| 2005 | A* | conf |
ACM Multimedia
|
| 2005 | C | conf |
Divide and conquer: the role of trust and assurance in the design of secure socio-technical systems.
NSPW
|
| 2005 | — | conf |
CHI Extended Abstracts
|
| 2005 | J | jnl |
Int. J. Hum. Comput. Stud.
|
| 2004 | A* | conf |
CHI
|
| 2004 | J | jnl |
Interact. Comput.
|
| 2004 | A* | ed. |
ACM Multimedia
|
| 2004 | A* | conf |
CHI
|
| 2004 | — | conf |
BCS HCI
|
| 2003 | C | conf |
NSPW
|
| 2003 | A* | conf |
CHI
|
| 2003 | A* | conf |
CHI
|
| 2003 | J | jnl |
Int. J. Hum. Comput. Stud.
|
| 2002 | — | conf |
I3E
|
| 2002 | — | conf |
CHI Extended Abstracts
|
| 2002 | J | jnl |
Electron. Libr.
|
| 2001 | — | conf |
GI Jahrestagung (1)
|
| 2001 | — | conf |
CHI Extended Abstracts
|
| 2001 | C | conf |
NSPW
|
| 2001 | — | conf |
BCS HCI/IHM
|
| 2001 | C | conf |
NSPW
|
| 2001 | A* | conf |
CHI
|
| 2001 | — | conf |
I3E
|
| 2001 | B | conf |
IWQoS
|
| 2000 | — | conf |
CHI Extended Abstracts
|
| 2000 | A* | conf |
ACM Multimedia
|
| 2000 | — | conf |
CHI Extended Abstracts
|
| 1999 | B | conf |
INTERACT
|
| 1999 | — | conf |
Integrated Network Management
|
| 1999 | — | conf |
IWAI
|
| 1999 | B | conf |
INTERACT
|
| 1999 | A* | conf |
ACM Multimedia (1)
|
| 1999 | J | jnl |
Commun. ACM
|
| 1998 | A* | conf |
ACM Multimedia
|
| 1998 | J | jnl |
Commun. ACM
|
| 1997 | — | conf |
BCS HCI
|
| 1997 | — | — |
|
| 1997 | — | conf |
BCS HCI
|
| 1996 | J | jnl |
Interact. Comput.
|
| 1996 | — | ed. |
BCS HCI
|
| 1994 | — | conf |
Broadband Islands
|
| 1993 | J | jnl |
Comput. Networks ISDN Syst.
|
| 1993 | B | conf |
ECSCW
|
| 1989 | — | conf |
Informatics and Psychology Workshop
|