Author of the publication

Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments.

, , , and . SP, page 347-359. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust link-translating proxy server mirroring the whole web., and . SAC, page 818-825. ACM, (2010)Painless migration from passwords to two factor authentication., , and . WIFS, page 1-6. IEEE Computer Society, (2011)Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments., , , and . SP, page 347-359. IEEE Computer Society, (2009)An Error Resilience Scheme for Packet Loss Recover of H.264 Video., , , and . PCM (2), volume 3332 of Lecture Notes in Computer Science, page 975-984. Springer, (2004)Administration in role-based access control., and . AsiaCCS, page 127-138. ACM, (2007)Evaluating role mining algorithms., , , , , and . SACMAT, page 95-104. ACM, (2009)Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection., , and . Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 238-255. Springer, (2009)Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper)., , and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 159-173. Springer, (2006)