BibTeX records: Sergej Dechand

download as .bib file

@inproceedings{DBLP:conf/eurosp/DechandND019,
  author       = {Sergej Dechand and
                  Alena Naiakshina and
                  Anastasia Danilova and
                  Matthew Smith},
  title        = {In Encryption We Don't Trust: The Effect of End-to-End Encryption
                  to the Masses on User Perception},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {401--415},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00037},
  doi          = {10.1109/EUROSP.2019.00037},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/DechandND019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/SchurmannDW17,
  author       = {Dominik Sch{\"{u}}rmann and
                  Sergej Dechand and
                  Lars C. Wolf},
  title        = {OpenKeychain: An Architecture for Cryptography with Smart Cards and
                  {NFC} Rings on Android},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {1},
  number       = {3},
  pages        = {99:1--99:24},
  year         = {2017},
  url          = {https://doi.org/10.1145/3130964},
  doi          = {10.1145/3130964},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/SchurmannDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaiakshinaDTHD017,
  author       = {Alena Naiakshina and
                  Anastasia Danilova and
                  Christian Tiefenau and
                  Marco Herzog and
                  Sergej Dechand and
                  Matthew Smith},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Why Do Developers Get Password Storage Wrong?: {A} Qualitative Usability
                  Study},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {311--328},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134082},
  doi          = {10.1145/3133956.3134082},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NaiakshinaDTHD017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08759,
  author       = {Alena Naiakshina and
                  Anastasia Danilova and
                  Christian Tiefenau and
                  Marco Herzog and
                  Sergej Dechand and
                  Matthew Smith},
  title        = {Why Do Developers Get Password Storage Wrong? {A} Qualitative Usability
                  Study},
  journal      = {CoRR},
  volume       = {abs/1708.08759},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.08759},
  eprinttype    = {arXiv},
  eprint       = {1708.08759},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-08759.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YakdanDG016,
  author       = {Khaled Yakdan and
                  Sergej Dechand and
                  Elmar Gerhards{-}Padilla and
                  Matthew Smith},
  title        = {Helping Johnny to Analyze Malware: {A} Usability-Optimized Decompiler
                  and Malware Analysis User Study},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {158--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.18},
  doi          = {10.1109/SP.2016.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/YakdanDG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DechandSBAF016,
  author       = {Sergej Dechand and
                  Dominik Sch{\"{u}}rmann and
                  Karoline Busse and
                  Yasemin Acar and
                  Sascha Fahl and
                  Matthew Smith},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {An Empirical Study of Textual Key-Fingerprint Representations},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {193--208},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/dechand},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DechandSBAF016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PerlD0AYRFA15,
  author       = {Henning Perl and
                  Sergej Dechand and
                  Matthew Smith and
                  Daniel Arp and
                  Fabian Yamaguchi and
                  Konrad Rieck and
                  Sascha Fahl and
                  Yasemin Acar},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects
                  to Assist Code Audits},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {426--437},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813604},
  doi          = {10.1145/2810103.2813604},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PerlD0AYRFA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/UngerDBFPG015,
  author       = {Nik Unger and
                  Sergej Dechand and
                  Joseph Bonneau and
                  Sascha Fahl and
                  Henning Perl and
                  Ian Goldberg and
                  Matthew Smith},
  title        = {SoK: Secure Messaging},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {232--249},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.22},
  doi          = {10.1109/SP.2015.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/UngerDBFPG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OltroggeAD0F15,
  author       = {Marten Oltrogge and
                  Yasemin Acar and
                  Sergej Dechand and
                  Matthew Smith and
                  Sascha Fahl},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {To Pin or Not to Pin-Helping App Developers Bullet Proof Their {TLS}
                  Connections},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {239--254},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/oltrogge},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OltroggeAD0F15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FahlDPFSS14,
  author       = {Sascha Fahl and
                  Sergej Dechand and
                  Henning Perl and
                  Felix Fischer and
                  Jaromir Smrcek and
                  Matthew Smith},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Hey, {NSA:} Stay Away from my Market! Future Proofing App Markets
                  against Powerful Attackers},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1143--1155},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660311},
  doi          = {10.1145/2660267.2660311},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FahlDPFSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KurmusDK14,
  author       = {Anil Kurmus and
                  Sergej Dechand and
                  R{\"{u}}diger Kapitza},
  editor       = {Sven Dietrich},
  title        = {Quantifiable Run-Time Kernel Attack Surface Reduction},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8550},
  pages        = {212--234},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08509-8\_12},
  doi          = {10.1007/978-3-319-08509-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KurmusDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}