Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IPSec: Performance Analysis and Enhancements., , and . ICC, page 1527-1532. IEEE, (2007)Resolvers Revealed: Characterizing DNS Resolvers and their Clients., and . ACM Trans. Internet Techn., 12 (4): 14:1-14:17 (2013)Control-Flow Integrity for Real-Time Embedded Systems., , , , , and . ECRTS, volume 133 of LIPIcs, page 2:1-2:24. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Sensitive Data Requests: Do Sites Ask Correctly?, and . ICC, page 1-5. IEEE, (2009)Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems., , , , and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 184-200. Springer, (2022)Message authentication codes for secure remote non-native client connections to ROS enabled robots., , and . TePRA, page 1-6. IEEE, (2014)Whole home proxies: Bringing enterprise-grade security to residential networks., , and . ICC, page 1-6. IEEE, (2016)Validating security protocols with cloud-based middleboxes., and . CNS, page 261-269. IEEE, (2016)Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity., and . HICSS, page 1-10. IEEE Computer Society, (2010)Abnormally Malicious Autonomous Systems and Their Internet Connectivity., , and . IEEE/ACM Trans. Netw., 20 (1): 220-230 (2012)