Author of the publication

Comparing the Usability of Cryptographic APIs.

, , , , , , and . IEEE Symposium on Security and Privacy, page 154-171. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

fFTP: a fast file transfer protocol for home N-screen platform., , , and . Personal and Ubiquitous Computing, 22 (1): 143-152 (2018)Adaptive video streaming over HTTP., , and . ACM Southeast Regional Conference, page 26:1-26:3. ACM, (2014)Scam Pandemic: How Attackers Exploit Public Fear through Phishing., , , , , , , , , and 2 other author(s). CoRR, (2021)Analyzing Spatial Differences in the TLS Security of Delegated Web Services., , , , and . AsiaCCS, page 475-487. ACM, (2021)An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover., , , and . Smart Comput. Rev., 1 (2): 150-160 (2011)Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures.. University of Maryland, College Park, MD, USA, (2020)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/26109).Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers., , , , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)Hiding Critical Program Components via Ambiguous Translation., , , , , , and . ICSE, page 1120-1132. ACM, (2022)Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem., , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 59-77. Springer, (2021)A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs., , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 7 (3): 59:1-59:26 (December 2023)