Author of the publication

Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely

, and . (August 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spread of invasive ragweed: climate change, management and how to reduce allergy costs, , , , , , and . Journal of Applied Ecology, 50 (6): 1422--1430 (December 2013)Poster: Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , and . In Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, (August 2018)Using 3D modelling and game engine technologies for interactive exploration of cultural heritage: An evaluation of four game engines in relation to roman archaeological heritage., , and . Digit. Appl. Archaeol. Cult. Heritage, (2019)Reduce response time: get "hooked" on a wiki., , and . SIGUCCS, page 185-189. ACM, (2007)No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations, , , and . Network and Distributed System Security (NDSS), ISOC, (2015)Participatory Design for Security-Related User Interfaces, , and . 22nd Annual Network and Distributed System Security Symposium, San Diego, California, USA, The Internet Society, (April 2015)Secret Program Execution in the Cloud applying Homomorphic Encryption, , , and . Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 114-119, (2011)Thermal infrared radiosity and heat diffusion model verification and validation., , , , and . WHISPERS, page 1-4. IEEE, (2010)Semi-Supervised Audio Representation Learning for Modeling Beehive Strengths., , , , and . CoRR, (2021)Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely, and . (August 2015)