Author of the publication

Bootstrapping Trust in Community Repository Projects.

, , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 450-469. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sigstore: Software Signing for Everybody., , and . CCS, page 2353-2367. ACM, (2022)SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses., , and . CCS, page 3671-3672. ACM, (2023)Speranza: Usable, Privacy-friendly Software Signing., , , and . CCS, page 3388-3402. ACM, (2023)SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties., , , and . SCORED@CCS, page 15-24. ACM, (2022)Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild., , , , , , , , and . IMC, page 457-477. ACM, (2023)Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware., , , , , and . CCWC, page 467-473. IEEE, (2024)An Industry Interview Study of Software Signing for Supply Chain Security., , , , and . CoRR, (2024)PolyPasswordHasher: Improving Password Storage Security., and . login Usenix Mag., (2014)in-toto: Providing farm-to-table guarantees for bits and bytes., , , , and . USENIX Security Symposium, page 1393-1410. USENIX Association, (2019)SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties., , , and . CoRR, (2024)