Author of the publication

Comparing the Usability of Cryptographic APIs.

, , , , , , and . IEEE Symposium on Security and Privacy, page 154-171. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Database nation (book excerpts).. Ubiquity, 2000 (February): 9 (2000)Understanding Database Reconstruction Attacks on Public Data., , and . ACM Queue, 16 (5): 50 (2018)Commodity Grid Computing with Amazon's S3 and EC2.. login Usenix Mag., (2007)Sharpening Your Tools: Updating bulk_extractor for the 2020s., and . ACM Queue, 21 (1): 30-56 (January 2023)Issues Encountered Deploying Differential Privacy., , and . WPES@CCS, page 133-137. ACM, (2018)Radio Research, McCarthyism and Paul F. Lazarsfeld. Massachusetts Institute of Technology, Cambridge, MA, Master's Thesis, (1987)Organizational practices in cryptographic development and testing., , and . CNS, page 1-9. IEEE, (2017)Practical UNIX and Internet security, and . Computer security O'Reilly, Bonn u.a., 2. ed., expanded & updated, compl. rewritten and exp. to include Internet security edition, (1996)Global Analysis of Drive File Times., and . SADFE, page 97-108. IEEE Computer Society, (2010)Language translation for file paths., , and . Digit. Investig., 10 (Supplement): S78-S86 (2013)