Publication statistics

Pub. period:1998-2010
Pub. count:4
Number of co-authors:6


Number of publications with 3 favourite co-authors:

Benjamin Gldenring:
Mehrdad Jalali-Sohi:
Philipp Schmidt:



Productive colleagues

Volker Roth's 3 most productive colleagues in number of publications:

Thea Turner:10
Kai Richter:6
Mehrdad Jalali-Soh..:1

Upcoming Courses

go to course
Dynamic User Experience: Ajax Design and Usability
go to course
Gestalt Psychology and Web Design: The Ultimate Guide
92% booked. Starts in 3 days

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !


Our Latest Books

The Glossary of Human Computer Interaction
by Mads Soegaard and Rikke Friis Dam
start reading
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading

Volker Roth


Publications by Volker Roth (bibliography)

 what's this?
Edit | Del

Roth, Volker, Schmidt, Philipp and Gldenring, Benjamin (2010): The IR ring: authenticating users' touches on a multi-touch display. In: Proceedings of the 2010 ACM Symposium on User Interface Software and Technology 2010. pp. 259-262.

Multi-touch displays are particularly attractive for collaborative work because multiple users can interact with applications simultaneously. However, unfettered access can lead to loss of data confidentiality and integrity. For example, one user can open or alter files of a second user, or impersonate the second user, while the second user is absent or not looking. Towards preventing these attacks, we explore means to associate the touches of a user with the user's identity in a fashion that is cryptographically sound as well as easy to use. We describe our current solution, which relies on a ring-like device that transmits a continuous pseudorandom bit sequence in the form of infrared light pulses. The multi-touch display receives and localizes the sequence, and verifies its authenticity. Each sequence is bound to a particular user, and all touches in the direct vicinity of the location of the sequence on the display are associated with that user.

© All rights reserved Roth et al. and/or their publisher

Edit | Del

Roth, Volker and Turner, Thea (2009): Bezel swipe: conflict-free scrolling and multiple selection on mobile touch screen devices. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems 2009. pp. 1523-1526.

Zooming user interfaces are increasingly popular on mobile devices with touch screens. Swiping and pinching finger gestures anywhere on the screen manipulate the displayed portion of a page, and taps open objects within the page. This makes navigation easy but limits other manipulations of objects that would be supported naturally by the same gestures, notably cut and paste, multiple selection, and drag and drop. A popular device that suffers from this limitation is Apple's iPhone. In this paper, we present Bezel Swipe, an interaction technique that supports multiple selection, cut, copy, paste and other operations without interfering with zooming, panning, tapping and other pre-defined gestures. Participants of our user study found Bezel Swipe to be a viable alternative to direct touch selection.

© All rights reserved Roth and Turner and/or ACM Press

Edit | Del

Roth, Volker, Straub, Tobias and Richter, Kai (2005): Security and usability engineering with particular attention to electronic mail. In International Journal of Human-Computer Studies, 63 (1) pp. 51-73.

Support for strong electronic mail security is widely available yet only few communicants appear to make use of these features. Apparently, the operational overhead of security outweighs its perceived benefits. Towards increasing the benefits versus overhead ratio we follow an approach that considers security and usability tradeoffs from the outset. We separate key exchange from binding keys to identities. The best effort key exchange and key maintenance scheme that we devise operates transparently for the user. We also describe complementary visualization and interaction techniques that communicate the security state of sent and received mail to users in a non-intrusive fashion. Structured interviews were conducted with 19 users to assess the usability of the metaphors and the complementary visualizations of the security state. Towards a practical assessment of the overheads of binding keys to identities, we conducted a quantitative analysis of 17 users' anonymized mailbox extracts to determine which security mechanisms would be most appropriate for their communication patterns. We argue that for individual non-commercial users, out-of-band verification of keys could be more economical than building trust in public key certificates issued by third parties.

© All rights reserved Roth et al. and/or Academic Press

Edit | Del

Roth, Volker and Jalali-Sohi, Mehrdad (1998): Access control and key management for mobile agents. In Computers & Graphics, 22 (4) pp. 457-461.

Add publication
Show list on your website

Join our community and advance:




Join our community!

Page Information

Page maintainer: The Editorial Team