Author of the publication

SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor.

, , , and . AsiaCCS, page 835-848. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Every Signature is Broken: On the Insecurity of Microsoft Office's OOXML Signatures., , , , and . USENIX Security Symposium, page 7411-7428. USENIX Association, (2023)On the Security of Holder-of-Key Single Sign-On., , and . Sicherheit, volume P-228 of LNI, page 65-77. GI, (2014)Processing Dangerous Paths - On Security and Privacy of the Portable Document Format., , , , and . NDSS, The Internet Society, (2021)Security Analysis of the 3MF Data Format., , and . RAID, page 179-194. ACM, (2023)Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-on., , and . EuroS&P, page 321-336. IEEE, (2016)Guardians of the Clouds: When Identity Providers Fail., , , and . CCSW, page 105-116. ACM, (2014)Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures., , , and . USENIX Security Symposium, page 3075-3092. USENIX Association, (2022)Shadow Attacks: Hiding and Replacing Content in Signed PDFs., , and . NDSS, The Internet Society, (2021)Breaking the Specification: PDF Certification., , , and . SP, page 1485-1501. IEEE, (2021)SSO-Monitor: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild., , , , , and . CoRR, (2023)