Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Kai Mindermann"'
Autor:
Stefan Wagner, Kai Mindermann
Publikováno v:
ICSE (Companion Volume)
Context: Programmers frequently look for the code of previously solved problems that they can adapt for their own problem. Despite existing example code on the web, on sites like Stack Overflow, cryptographic Application Programming Interfaces (APIs)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::92bfbd36df80f7f20c1ecd7a03768d27
Autor:
Kai Mindermann, Stefan Wagner
Publikováno v:
PST
Context: Cryptographic APIs are said to be not usable and researchers suggest to add example code to the documentation. Aim: We wanted to create a free platform for cryptographic code examples that improves the usability and security of created appli
Publikováno v:
QRS
Context: Poor usability of cryptographic APIs is a severe source of vulnerabilities. Aim: We wanted to find out what kind of cryptographic libraries are present in Rust and how usable they are. Method: We explored Rust's cryptographic libraries throu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e987c59e5409f1a512602ec9a6931184
http://arxiv.org/abs/1806.04929
http://arxiv.org/abs/1806.04929
Publikováno v:
PerCom Workshops
As Smart Devices have access to a lot of user-preferential data, they come in handy in any situation. Although such data—as well as the knowledge which can be derived from it—is highly beneficial as apps are able to adapt their services appropria
Autor:
Bernhard Mitschang, Manuela Wagner, Frank Dürr, Stefanie Betz, Andreas Fritsch, Andreas Oberweis, Saravana Murthy Palanisamy, Gunther Schiefer, Stefan Wagner, Kai Mindermann, Sascha Alpers, Christoph Stach
Publikováno v:
Scopus-Elsevier
ICETE (2)
ICETE (2)
Applications for the Internet of Things are becoming increasingly popular. Due to the large amount of available context data, such applications can be used effectively in many domains. By interlinking these data and analyzing them, it is possible to
Context: System Theoretic Process Analysis for Privacy (STPA-Priv) is a novel privacy risk elicitation method using a top down approach. It has not gotten very much attention but may offer a convenient structured approach and generation of additional
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::58f4489777425752f270d8d062febe98
Publikováno v:
ICSE (Companion Volume)
Changing our practical software engineering course from the previous waterfall model to a more agile and iterative approach created more severe assessment challenges. To cope with them we added an assessment concept based on play money. The concept n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ac30ae493738bed2186c78b430258a09
Autor:
Kai Mindermann
Due to non-experts also developing security relevant applications it is necessary to support them too. Some improvements in the current research may not reach or impact these developers. Nonetheless these developers use security libraries. There are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b5c4a4686100be06f687524932fcd474