Kai Mindermann

According to our database1, Kai Mindermann authored at least 12 papers between 2016 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Fluid intelligence doesn't matter!: effects of code examples on the usability of crypto APIs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

2019
Towards a central, distributed and secure default cryptography parameter set.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

2018
Usability and Security Effects of Code Examples on Crypto APIs - CryptoExamples: A platform for free, minimal, complete and secure crypto examples.
CoRR, 2018

How Usable Are Rust Cryptography APIs?
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Usability and Security Effects of Code Examples on Crypto APIs.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

How a Pattern-based Privacy System Contributes to Improve Context Recognition.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

CryptoExamples: Secure, minimal, complete, copyable and tested code examples for Crypto APIs.
Proceedings of the 28. Krypto-Tag, 2018

The AVARE PATRON - A Holistic Privacy Approach for the Internet of Things.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Exploratory Study of the Privacy Extension for System Theoretic Process Analysis (STPA-Priv) to Elicit Privacy Risks in eHealth.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017

PATRON - Datenschutz in Datenstromverarbeitungssystemen.
Proceedings of the 47. Jahrestagung der Gesellschaft für Informatik, 2017

2016
Assessing iterative practical software engineering courses with play money.
Proceedings of the 38th International Conference on Software Engineering, 2016

Are easily usable security libraries possible and how should experts work together to create them?
Proceedings of the 9th International Workshop on Cooperative and Human Aspects of Software Engineering, 2016


  Loading...