共 50 条
- [32] A Mixed-Methods Study of Security Practices of Smart Contract Developers [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2545 - 2562
- [34] Security-typed languages for implementation of cryptographic protocols: A case study [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 197 - 221
- [35] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270
- [36] Point-and-Shoot Security Design: Can We Build Better Tools for Developers? [J]. PROCEEDINGS OF THE 2012 NEW SECURITY PARADIGMS WORKSHOP (NSPW'12), 2012, : 27 - 41
- [37] Cryptographic core design security verification and vulnerability detection based on information flow analysis [J]. Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2022, 40 (01): : 76 - 83
- [38] On the Recruitment of Company Developers for Security Studies: Results from a Qualitative Interview Study [J]. PROCEEDINGS OF THE NINETEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, SOUPS 2023, 2023, : 321 - 340
- [40] Preliminary Findings on FOSS Dependencies and Security A Qualitative Study on Developers' Attitudes and Experience [J]. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2020), 2020, : 284 - 285