Cryptography's Developer Dilemma: An Urgent Call for API Research
Table of Links
Abstract and I. Introduction
II. Related Work
III. Methodology
IV. Results and Discussion
V. Threats to Validity
VI. Conclusions, Acknowledgments, and References
\
Abstract—Prior rese...