Publikationen https://www.besec.uni-bonn.de/publications/publikationen https://www.besec.uni-bonn.de/++resource++plone-logo.svg Publikationen A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany Behavioral responses to a cyber attack in a hospital environment Big data privacy issues in public social media Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage Debunking Security-Usability Tradeoff Myths Deception Task Design in Developer Password Studies: Exploring a Student Sample Developers are Not the Enemy!: The Need for Usable Security APIs Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice Do you Really Code? Designing and Evaluating Screening Questions for Online Surveys with Programmers Empirical Evaluation of Secure Development Processes Evaluation kontextueller Datenschutzerklärungen Obstacles to the Adoption of Secure Communication Tools A Discussion of Surveillance Backdoors: Effectiveness, Collateral Damage, and Ethics Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost
A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players
Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost
Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany
Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage
Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice
Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost