Author of the publication

Secure and customizable web development in the safe activation framework.

, , and . ACM Conference on Computer and Communications Security, page 1341-1344. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Transparency for Better Internet Security., , , , and . IEEE/ACM Trans. Netw., 27 (5): 2028-2042 (2019)Balancing Isolation and Sharing of Data for Third-Party Extensible App Ecosystems., , and . CoRR, (2014)SIBRA: Scalable Internet Bandwidth Reservation Architecture., , , , , , , and . NDSS, The Internet Society, (2016)Designing a Global Authentication Infrastructure., , , , and . CoRR, (2015)Forwarding Accountability: A Challenging Necessity of the Future Data Plane., , and . iNetSeC, volume 9591 of Lecture Notes in Computer Science, page 3-10. Springer, (2015)Authentication Challenges in a Global Environment., , , , and . ACM Trans. Priv. Secur., 20 (1): 1:1-1:34 (2017)Balancing Isolation and Sharing of Data in Third-Party Extensible App Ecosystems., , and . ICWE, volume 9114 of Lecture Notes in Computer Science, page 713-716. Springer, (2015)SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks., , , and . CoRR, (2015)IKP: Turning a PKI Around with Decentralized Automated Incentives., and . IEEE Symposium on Security and Privacy, page 410-426. IEEE Computer Society, (2017)Secure and customizable web development in the safe activation framework., , and . ACM Conference on Computer and Communications Security, page 1341-1344. ACM, (2013)