Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quack: Scalable Remote Measurement of Application-Layer Censorship., , , , and . USENIX Security Symposium, page 187-202. USENIX Association, (2018)Running Refraction Networking for Real., , , , , , , , and . Proc. Priv. Enhancing Technol., 2020 (4): 321-335 (2020)Imperfect forward secrecy: how Diffie-Hellman fails in practice., , , , , , , , , and 4 other author(s). Commun. ACM, 62 (1): 106-114 (2019)A security analysis of police computer systems., , and . PST, page 714-721. IEEE, (2016)A memory rename table to reduce energy and improve performance., , and . ISLPED, page 279-282. ACM, (2014)An ISP-Scale Deployment of TapDance., , , , , , , , , and 3 other author(s). FOCI @ USENIX Security Symposium, USENIX Association, (2017)DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work., and . WOOT, USENIX Association, (2016)403 Forbidden: A Global View of CDN Geoblocking., , , , , , , and . Internet Measurement Conference, page 218-230. ACM, (2018)Enhancing System Transparency, Trust, and Privacy with Internet Measurement.. University of Michigan, USA, (2020)Towards a Complete View of the Certificate Ecosystem., , , , , and . Internet Measurement Conference, page 543-549. ACM, (2016)