Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Moderne Verfahren der Krypotgraphie - von RSA zu Zero-Knowledge (6. Aufl.)., , and . Vieweg, (2006)Waiting for CSP - Securing Legacy Web Applications with JSAgents., , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 23-42. Springer, (2015)Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos.. IACR Cryptology ePrint Archive, (2013)Key-assignment strategies for CPPM., and . MM&Sec, page 107-115. ACM, (2004)DOMPurify: Client-Side Protection Against XSS and Markup Injection., , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 116-134. Springer, (2017)Public Key Encryption and Signature Schemes Based on Polynomials over Zn., and . EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 60-71. Springer, (1996)Processing Dangerous Paths - On Security and Privacy of the Portable Document Format., , , , and . NDSS, The Internet Society, (2021)TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries., , , , , and . USENIX Security Symposium, page 215-232. USENIX Association, (2022)Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet., , , , and . USENIX Security Symposium, page 4859-4876. USENIX Association, (2023)Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web Browsers., , , , and . CCS, page 2456-2470. ACM, (2023)