Author of the publication

Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely

, and . (August 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Proofs of Software Exploitability for Real-world Processors., , , , , and . Proc. Priv. Enhancing Technol., 2023 (1): 627-640 (January 2023)A Protocol for Privately Reporting Ad Impressions at Scale., , and . ACM Conference on Computer and Communications Security, page 1591-1601. ACM, (2016)Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication., and . VEHITS, page 522-528. SciTePress, (2018)Keys under doormats: mandating insecurity by requiring government access to all data and communications., , , , , , , , , and 5 other author(s). J. Cybersecur., 1 (1): 69-79 (2015)Blogging birds: Generating narratives about reintroduced species to promote public engagement., , , , and . INLG, page 120-124. The Association for Computer Linguistics, (2012)Fluid MPC: Secure Multiparty Computation with Dynamic Participants., , , , and . CRYPTO (2), volume 12826 of Lecture Notes in Computer Science, page 94-123. Springer, (2021)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , and . USENIX Security Symposium, page 655-672. USENIX Association, (2016)Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers., , and . NDSS, The Internet Society, (2019)Charm: A Framework for Rapidly Prototyping Cryptosystems., , and . NDSS, The Internet Society, (2012)Downgrade Resilience in Key-Exchange Protocols., , , , , and . IEEE Symposium on Security and Privacy, page 506-525. IEEE Computer Society, (2016)