Author of the publication

Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.

, , , , , , and . Comput. Commun. Rev., 50 (3): 3-15 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LoRadar: LoRa sensor network monitoring through passive packet sniffing., , , , , , , and . Comput. Commun. Rev., 50 (4): 10-24 (2020)Update on ACM SIGCOMM CCR reviewing process: towards a more open review process., , , , , , , , , and 3 other author(s). Comput. Commun. Rev., 50 (3): 55-56 (2020)Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)., , and . RFC, (February 2015)Triplet Mining-based Phishing Webpage Detection., , , , and . LCN, page 377-380. IEEE, (2020)Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)., , and . RFC, (May 2015)A Responsible Internet to Increase Trust in the Digital World., , , , , , , , , and 2 other author(s). J. Netw. Syst. Manag., 28 (4): 882-922 (2020)Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach., , and . NetSoft, page 346-349. IEEE, (2023)Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute., , , , , and . TMA, page 1-10. IEEE, (2023)A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web., , , , , , , , and . TMA, IFIP, (2020)Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns., , , , , and . CoRR, (2023)