共 50 条
- [1] Developers Deserve Security Warnings, Too On the Effect of Integrated Security Advice on Cryptographic API Misuse [J]. PROCEEDINGS OF THE FOURTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, 2018, : 265 - 280
- [3] The design of a cryptographic security architecture [J]. USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168
- [4] SECURITY FEATURES COMPARISON OF MASTER KEY AND IKM CRYPTOGRAPHIC KEY MANAGEMENT FOR RESEARCHERS AND DEVELOPERS [J]. PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2011), 2011, : 365 - 369
- [5] Design for Security Test on Cryptographic ICs for Design-Time Security Evaluation [J]. 2014 9TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2014, : 118 - 123
- [6] How Do Developers Use APIs? A Case Study in Concurrency [J]. 2013 18TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS), 2013, : 212 - 221
- [7] Are Developers Equally Concerned About Making Their APIs RESTful and the Linguistic Quality? A Study on Google APIs [J]. SERVICE-ORIENTED COMPUTING (ICSOC 2021), 2021, 13121 : 171 - 187
- [8] Design of a Cryptographic Tamper Detection Scheme for Network Security [J]. ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 214 - 224
- [9] A Comparative Study of Cryptographic Algorithms for Cloud Security [J]. EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 409 - 415
- [10] Investigate How Developers and Managers View Security Design in Software [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023, 2023, : 693 - 700