Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries., , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Capturing mobile security policies precisely. University of Edinburgh, UK, (2018)British Library, EThOS.Threat-Driven Dynamic Security Policies for Cyber-Physical Infrastructures., , , , , , and . CRITIS, volume 13723 of Lecture Notes in Computer Science, page 9-26. Springer, (2022)Developers Are Neither Enemies Nor Users: They Are Collaborators., , , , and . SecDev, page 47-55. IEEE, (2021)Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations., , , and . CoRR, (2021)"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords?, , , and . ICSE, page 486-498. IEEE, (2021)Mirror, Mirror, On the Wall: What are we Teaching Them All? Characterising the Focus of Cybersecurity Curricular Frameworks., , and . ASE @ USENIX Security Symposium, USENIX Association, (2018)Super Mario in the Pernicious Kingdoms: Classifying glitches in old games., , , and . CoRR, (2024)SLR: From Saltzer and Schroeder to 2021...47 Years of Research on the Development and Validation of Security API Recommendations., , , and . ACM Trans. Softw. Eng. Methodol., 32 (3): 60:1-60:31 (May 2023)