Autor der Publikation

Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories.

, , , , , und . USENIX Security Symposium, Seite 2527-2544. USENIX Association, (2023)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications, , , , , , und . In 41st IEEE Symposium on Security and Privacy, IEEE S&P 2020, May 18-20, 2020, (Mai 2020)Hey, You, Get Off of My Clipboard, , , , und . Financial Cryptography and Data Security, Volume 7859 von Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)Securing Your Crypto-API Usage Through Tool Support - A Usability Study., , , , , , , , und . SecDev, Seite 14-25. IEEE, (2023)Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs., , , und . CHI, Seite 1-13. ACM, (2020)"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup., , , , und . SOUPS, Seite 171-190. USENIX Association, (2023)If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers., , , , , , und . SOUPS @ USENIX Security Symposium, Seite 313-330. USENIX Association, (2022)"You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards., , , , , , , und . USENIX Security Symposium, USENIX Association, (2024)"You Received $100,000 From Johnny": A Mixed-Methods Study on Push Notification Security and Privacy in Android Apps., , und . IEEE Access, (2024)How Internet Resources Might Be Helping You Develop Faster but Less Securely., , , , , und . IEEE Security & Privacy, 15 (2): 50-60 (2017)Poster: Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , und . In Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, (August 2018)