scispace - formally typeset
L

Ludwig Trotter

Researcher at Lancaster University

Publications -  15
Citations -  137

Ludwig Trotter is an academic researcher from Lancaster University. The author has contributed to research in topics: Escrow & Authentication. The author has an hindex of 4, co-authored 14 publications receiving 70 citations. Previous affiliations of Ludwig Trotter include Ludwig Maximilian University of Munich.

Papers
More filters
Journal ArticleDOI

CueAuth: Comparing Touch, Mid-Air Gestures, and Gaze for Cue-based Authentication on Situated Displays

TL;DR: This paper provides the first comparison between touch, mid-air gestures, and calibration-free gaze using a state-of-the-art authentication concept and discusses how the choice of modality creates opportunities and challenges for improved authentication in public.
Proceedings ArticleDOI

EyeVote in the wild: do users bother correcting system errors on public displays?

TL;DR: It is found that public display users are willing to correct system errors provided that the correction is fast and straightforward, and how the findings influence the choice of interaction methods for public displays.
Proceedings ArticleDOI

Programmable Donations: Exploring Escrow-Based Conditional Giving

TL;DR: The study elicited how data-driven conditionality and automation could be leveraged to create novel donor experiences, however also illustrated the inherent tensions and challenges involved in giving programmatically.
Proceedings ArticleDOI

Blockchain and Cryptocurrency in Human Computer Interaction: A Systematic Literature Review and Research Agenda

TL;DR: A systematic literature review of cryptocurrency and blockchain research in Human-Computer Interaction published between 2014 and 2021 aims to provide an overview of the field, consolidate existing knowledge, and chart paths for future research.
Journal ArticleDOI

IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats

TL;DR: The problem domain is introduced, the lack of prior research is demonstrated, example threats are discussed, and example threats based on a real-world case study are discussed.