From post

Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.

, , , , , , , , , и . CSET @ USENIX Security Symposium, USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing Your Crypto-API Usage Through Tool Support - A Usability Study., , , , , , , , и . SecDev, стр. 14-25. IEEE, (2023)Hey, You, Get Off of My Clipboard, , , , и . Financial Cryptography and Data Security, том 7859 из Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications, , , , , , и . In 41st IEEE Symposium on Security and Privacy, IEEE S&P 2020, May 18-20, 2020, (мая 2020)Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs., , , и . CHI, стр. 1-13. ACM, (2020)"You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards., , , , , , , и . USENIX Security Symposium, USENIX Association, (2024)"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup., , , , и . SOUPS, стр. 171-190. USENIX Association, (2023)If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers., , , , , , и . SOUPS @ USENIX Security Symposium, стр. 313-330. USENIX Association, (2022)"You Received $100,000 From Johnny": A Mixed-Methods Study on Push Notification Security and Privacy in Android Apps., , и . IEEE Access, (2024)How Internet Resources Might Be Helping You Develop Faster but Less Securely., , , , , и . IEEE Security & Privacy, 15 (2): 50-60 (2017)(Un)informed Consent: Studying GDPR Consent Notices in the Field., , , , и . ACM Conference on Computer and Communications Security, стр. 973-990. ACM, (2019)