Author of the publication

A Fixed-Point Algorithm for Automated Static Detection of Infinite Loops.

, and . HASE, page 44-51. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations., , , and . HCI (32), volume 13333 of Lecture Notes in Computer Science, page 173-193. Springer, (2022)User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach., , , , and . SOUPS @ USENIX Security Symposium, page 341-358. USENIX Association, (2020)Expert Mental Models of SSI Systems and Implications for End-User Understanding.. IACR Cryptol. ePrint Arch., (2022)On the Usability of Authenticity Checks for Hardware Security Tokens., , , , , , , and . USENIX Security Symposium, page 37-54. USENIX Association, (2021)Mental Models of the Internet and Its Online Risks: Children and Their Parent(s)., , , , and . HCI (32), volume 13333 of Lecture Notes in Computer Science, page 42-61. Springer, (2022)A Fixed-Point Algorithm for Automated Static Detection of Infinite Loops., and . HASE, page 44-51. IEEE Computer Society, (2015)Replication: Stories as Informal Lessons about Security., , , , and . SOUPS @ USENIX Security Symposium, page 1-18. USENIX Association, (2022)Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure., , , , , and . DeFi@CCS, page 1-8. ACM, (2021)