Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Waiting for CSP - Securing Legacy Web Applications with JSAgents., , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 23-42. Springer, (2015)Moderne Verfahren der Krypotgraphie - von RSA zu Zero-Knowledge (6. Aufl.)., , and . Vieweg, (2006)Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos.. IACR Cryptology ePrint Archive, (2013)Key-assignment strategies for CPPM., and . MM&Sec, page 107-115. ACM, (2004)DOMPurify: Client-Side Protection Against XSS and Markup Injection., , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 116-134. Springer, (2017)Public Key Encryption and Signature Schemes Based on Polynomials over Zn., and . EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 60-71. Springer, (1996)Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet., , , , and . USENIX Security Symposium, page 4859-4876. USENIX Association, (2023)TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries., , , , , and . USENIX Security Symposium, page 215-232. USENIX Association, (2022)Processing Dangerous Paths - On Security and Privacy of the Portable Document Format., , , , and . NDSS, The Internet Society, (2021)SSL-VA-Authentifizierung als Schutz von Phishing und Pharming., , and . Sicherheit, volume P-77 of LNI, page 6-17. GI, (2006)