Jan H. Klemmer

Orcid: 0000-0002-6994-7206

According to our database1, Jan H. Klemmer authored at least 14 papers between 2022 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange.
CoRR, July, 2025

Transparency in Usable Privacy and Security Research: Scholars' Perspectives, Practices, and Recommendations.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
How the Future Works at SOUPS: Analyzing Future Work Statements and Their Impact on Usable Security and Privacy Research.
CoRR, 2024

"You have to read 50 different RFCs that contradict each other": An Interview Study on the Experiences of Implementing Cryptographic Standards.
Proceedings of the 33rd USENIX Security Symposium, 2024

Committed to Trust: A Qualitative Study on Security and Trust in Open Source Software Projects.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024

Always Contribute Back: A Qualitative Study on Security Challenges of the Open Source Supply Chain.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024

Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret Information in Source Code Repositories.
Proceedings of the 32nd USENIX Security Symposium, 2023

"Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories.
CoRR, 2022

Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022


  Loading...