Martin Ukrop
Orcid: 0000-0001-8110-8926
According to our database1,
Martin Ukrop
authored at least 19 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developers.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2022
Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version).
CoRR, 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022
Assessing Real-World Applicability of Redesigned Developer Documentation for Certificate Validation Errors.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
2021
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021
Proceedings of the ITiCSE '21: Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V.1, Virtual Event, Germany, June 26, 2021
2020
Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, 2020
2019
Proceedings of the Security Protocols XXVII, 2019
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Experimental large-scale review of attractors for detection of potentially unwanted applications.
Comput. Secur., 2018
Why Johnny the Developer Can't Work with Public Key Certificates - An Experimental Study of OpenSSL Usability.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2016
Proceedings of the Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, 2016
2014
2013
Proceedings of the SECRYPT 2013, 2013
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013