| A | B | C | D | E | |
|---|---|---|---|---|---|
1 | Title | Authors | Venue | Year | Link |
2 | Using cognitive dimensions to evaluate the usability of security APIs: An empirical investigation | Wijayarathna, Chamila, and Nalin Asanka Gamagedara Arachchilage | Information and Software Technology | 2019 | https://www.sciencedirect.com/science/article/abs/pii/S0950584919301624 |
3 | Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic API misuse | Gorski, Peter Leo, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, and Sascha Fahl. | SOUPS | 2018 | https://www.usenix.org/system/files/conference/soups2018/soups2018-gorski.pdf |
4 | A methodology to evaluate the usability of security APIs | Wijayarathna, Chamila, and Nalin AG Arachchilage | IEEE International Conference on Information and Automation for Sustainability (ICIAfS) | 2018 | https://ieeexplore.ieee.org/abstract/document/8913353/ |
5 | A generic cognitive dimensions questionnaire to evaluate the usability of security APIs. | Wijayarathna, Chamila, Nalin AG Arachchilage, and Jill Slay | HCI International | 2017 | https://link.springer.com/chapter/10.1007/978-3-319-58460-7_11 |
6 | I do and I understand. Not yet true for security APIs. So sad | Iacono, Luigi Lo, and Peter Leo Gorski | Euro USEC | 2017 | https://www.ndss-symposium.org/wp-content/uploads/2018/03/eurousec2017_15_LoIacono_paper.pdf |
7 | Comparing the usability of cryptographic APIs | Acar, Yasemin, Michael Backes, Sascha Fahl, Simson Garfinkel, Doowon Kim, Michelle L. Mazurek, and Christian Stransky. | IEEE S&P | 2017 | https://usp.internet.byu.edu/static/papers/cryptographic-apis-sp-2017.pdf |
8 | Towards the usability evaluation of security APIs | Gorski, Peter Leo, and Luigi Lo Iacono | HAISA | 2016 | https://books.google.com.au/books?hl=en&lr=&id=zRqqDAAAQBAJ&oi=fnd&pg=PA252&dq=Towards+the+usability+evaluation+of+security+APIs&ots=lt6P79CoPE&sig=3H5g1lgZhjBZj5WaCqDC3jJ06gU#v=onepage&q=Towards%20the%20usability%20evaluation%20of%20security%20APIs&f=false |
9 | Developers are not the enemy!: The need for usable security APIs | Green, Matthew, and Matthew Smith | IEEE Security & Privacy | 2016 | http://mattsmith.de/pdfs/DevelopersAreNotTheEnemy.pdf |
10 | Jumping through hoops: Why do Java developers struggle with cryptography APIs? | Nadi, Sarah, Stefan Krüger, Mira Mezini, and Eric Bodden | ICSE | 2016 | https://www.bodden.de/pubs/nkm+16jumping.pdf |