Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring., , , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 87-105. Springer, (2022)A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web., , , , , , , , and . TMA, IFIP, (2020)Measuring the Latency and Pervasiveness of TLS Certificate Revocation., , and . PAM, volume 9631 of Lecture Notes in Computer Science, page 16-29. Springer, (2016)The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures., , and . ACM Conference on Computer and Communications Security, page 1289-1306. ACM, (2020)Mission accomplished?: HTTPS security after diginotar., , , , , and . Internet Measurement Conference, page 325-340. ACM, (2017)The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods., , , and . CoRR, (2019)Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization., , , , , , and . Comput. Commun. Rev., 50 (3): 3-15 (2020)Redundancy and access permissions in decentralized file systems.. Technical University Munich, (2011)Towards a Complete View of the Certificate Ecosystem., , , , , and . Internet Measurement Conference, page 543-549. ACM, (2016)Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring., , , and . CoRR, (2021)