Author of the publication

Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely

, and . (August 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System, , and . Proc. of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011), ACM, (2011)Medical Case-Driven Classification of Microblogs: Characteristics and Annotation, , , and . Proc. of ACM SIGHIT International Health Informatics Symposium (IHI 2012), Miami, Florida, USA, January 28-30, 2012, (2011)Towards a Mobile Security & Privacy Simulator, , and . Proceedings of 2011 IEEE Conference on Open Systems, page 95 - 100. (September 2011)Using Personal Examples to Improve Risk Communication for Security &\#38; Privacy Decisions, , , and . Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, page 2647--2656. New York, NY, USA, ACM, (2014)Fast Confidential Search for Bio-Medical Data Using Bloom Filters and Homomorphic Cryptography, , , and . 2012 IEEE Eighth International Conference on eScience, 2012 IEEE Eighth International Conference on eScience, Los Alamitos, CA, USA, IEEE Computer Society, IEEE Computer Society, (2012)To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections, , , , and . 24th USENIX Security Symposium (USENIX Security 15), page 239--254. Washington, D.C., USENIX Association, (August 2015)Coupled multi-agent simulations for mobile security & privacy research., , and . DEST, page 1-6. IEEE, (2012)Exploring Design Directions for Wearable Privacy, , , and . (January 2017)Hidden messages: evaluating the efficiency of code elision in program navigation., and . Interact. Comput., 15 (3): 387-407 (2003)A digital file inventory of the Queens College Special Collections and Archives: Findings, analysis and recommendations for long-term preservation., , , , and . OCLC Syst. Serv., 30 (2): 78-90 (2014)