Author of the publication

Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.

, , , , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores., , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 307-315. Springer, (2014)Helping Johnny 2.0 to encrypt his Facebook conversations., , , , and . SOUPS, page 11. ACM, (2012)On the importance of ecologically valid usable security research for end users and IT workers.. University of Hanover, Hannover, Germany, (2016)Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors., , , , , , , , and . ACM Conference on Computer and Communications Security, page 1407-1420. ACM, (2017)Sorry, I Don't Get It: An Analysis of Warning Message Texts., , , and . Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, page 94-111. Springer, (2013)Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse., , , , , , and . SOUPS @ USENIX Security Symposium, page 265-281. USENIX Association, (2018)TrustBox: A Security Architecture for Preventing Data Breaches., , , and . PDP, page 635-639. IEEE Computer Society, (2011)TrustSplit: usable confidentiality for social network messaging., , , and . HT, page 145-154. ACM, (2012)Comparing the Usability of Cryptographic APIs., , , , , , and . IEEE Symposium on Security and Privacy, page 154-171. IEEE Computer Society, (2017)SoK: Secure Messaging., , , , , , and . IEEE Symposium on Security and Privacy, page 232-249. IEEE Computer Society, (2015)