Author of the publication

An Empirical Study on the Effectiveness of Security Code Review.

, , , , , and . ESSoS, volume 7781 of Lecture Notes in Computer Science, page 197-212. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A "bump in the stack" encryptor for MS-DOS systems., and . NDSS, page 155-161. IEEE Computer Society, (1996)Insecurity in ATM-based passive optical networks., and . ICC, page 2803-2805. IEEE, (2002)Data management in the mission data system.. SMC, page 3788-3792. IEEE, (2005)Towards Evaluating the Robustness of Neural Networks., and . CoRR, (2016)MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples., and . CoRR, (2017)A Critique of CCM., and . IACR Cryptology ePrint Archive, (2003)Analyzing internet voting security., , , and . Commun. ACM, 47 (10): 59-64 (2004)Cryptanalysis of SPEED., , , and . Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, page 309-310. Springer, (1998)Proofs of Security for the Unix Password Hashing Algorithm., and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 560-572. Springer, (2000)Static Analysis and Software Assurance.. SAS, volume 2126 of Lecture Notes in Computer Science, page 431. Springer, (2001)