Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DISCO: Sidestepping RPKI's Deployment Barriers., , , , , , and . NDSS, The Internet Society, (2020)Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet., , , and . USENIX Security Symposium, page 4841-4858. USENIX Association, (2023)Not All Conflicts Are Created Equal: Automated Error Resolution in RPKI Deployments., , and . INFOCOM Workshops, page 1-2. IEEE, (2021)Behind the Scenes of RPKI., , , , and . CCS, page 1413-1426. ACM, (2022)Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security., , , , and . HotNets, page 57-63. ACM, (2018)Stalloris: RPKI Downgrade Attack., , , , and . USENIX Security Symposium, page 4455-4471. USENIX Association, (2022)Smart RPKI Validation: Avoiding Errors and Preventing Hijacks., , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 509-530. Springer, (2022)Practical Experience: Methodologies for Measuring Route Origin Validation., , , and . DSN, page 634-641. IEEE Computer Society, (2018)Beyond Limits: How to Disable Validators in Secure Networks., , , , and . SIGCOMM, page 950-966. ACM, (2023)