Login / Signup
Thomas Groß
Publication Activity (10 Years)
Years Active: 2002-2024
Publications (10 Years): 13
Top Topics
Internet Users
Police Officers
Privacy Concerns
Behavioral Intention
Top Venues
CoRR
STAST
Proc. Priv. Enhancing Technol.
ICETE (Selected Papers)
</>
Publications
</>
Rachel Crowder
,
George Price
,
Thomas Groß
Simply tell me how - On Trustworthiness and Technology Acceptance of Attribute-Based Credentials.
Proc. Priv. Enhancing Technol.
2024 (4) (2024)
Thomas Groß
Towards Valid and Reliable Privacy Concern Scales: The Example of IUIPC-8.
CoRR
(2023)
Rachel Crowder
,
George Price
,
Thomas Groß
Simply tell me how - On Trustworthiness and Technology Acceptance of Attribute-Based Credentials.
CoRR
(2023)
Thomas Groß
Validity and Reliability of the Scale Internet Users' Information Privacy Concerns (IUIPC).
Proc. Priv. Enhancing Technol.
2021 (2) (2021)
Thomas Groß
Hashing to Prime in Zero-Knowledge.
SECRYPT
(2021)
Thomas Groß
Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications.
ICETE (Selected Papers)
(2021)
Tom Fordyce
,
Sam Green
,
Thomas Groß
Investigation of the Effect of Fear and Stress on Password Choice (Extended Version).
CoRR
(2020)
Thomas Groß
Statistical Reliability of 10 Years of Cyber Security User Studies (Extended Version).
CoRR
(2020)
Uchechi Phyllis Nwadike
,
Thomas Groß
Investigation of the Effect of Incidental Fear Privacy Behavioral Intention (Technical Report).
CoRR
(2020)
Thomas Groß
Validity and Reliability of the Scale Internet Users' Information Privacy Concern (IUIPC) [Extended Version].
CoRR
(2020)
Thomas Groß
Statistical Reliability of 10 Years of Cyber Security User Studies.
STAST
(2020)
Uchechi Phyllis Nwadike
,
Thomas Groß
Investigating the Effect of Incidental Affect States on Privacy Behavioral Intention.
STAST
(2019)
Tom Fordyce
,
Sam Green
,
Thomas Groß
Investigation of the effect of fear and stress on password choice.
STAST
(2017)
Thomas Groß
Unabhängigkeit der Datenschutzaufsicht - Zur Neuordnung des Datenschutzes in Hessen.
Datenschutz und Datensicherheit
26 (11) (2002)