Author of the publication

Protecting Secret Data from Insider Attacks.

, , and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 16-30. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Environment-Sensitive Intrusion Detection., , , , and . RAID, volume 3858 of Lecture Notes in Computer Science, page 185-206. Springer, (2005)Understanding the Privacy Implications of ECS - (Extended Abstract)., , , , and . DIMVA, volume 9721 of Lecture Notes in Computer Science, page 343-353. Springer, (2016)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)Recursive DNS Architectures and Vulnerability Implications., , , , , and . NDSS, The Internet Society, (2009)SinkMiner: Mining Botnet Sinkholes for Fun and Profit., , , and . LEET, USENIX Association, (2013)Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains., , , , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE Computer Society, (2016)Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet., , , , , and . Comput. Secur., (2017)Protecting Secret Data from Insider Attacks., , and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 16-30. Springer, (2005)Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries., , , , and . ACM Conference on Computer and Communications Security, page 211-222. ACM, (2008)Large-scale DNS data analysis.. CCS, page 1054-1055. ACM, (2012)