Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Packet Forwarding: Name-based Vs. Prefix-Based, and . IEEE Global Internet Symposium, (May 2007)IPSec: Performance Analysis and Enhancements., , and . ICC, page 1527-1532. IEEE, (2007)Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems., , , , and . ICICS, volume 13407 of Lecture Notes in Computer Science, page 184-200. Springer, (2022)Sensitive Data Requests: Do Sites Ask Correctly?, and . ICC, page 1-5. IEEE, (2009)Whole home proxies: Bringing enterprise-grade security to residential networks., , and . ICC, page 1-6. IEEE, (2016)Message authentication codes for secure remote non-native client connections to ROS enabled robots., , and . TePRA, page 1-6. IEEE, (2014)Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity., and . HICSS, page 1-10. IEEE Computer Society, (2010)Control-Flow Integrity for Real-Time Embedded Systems., , , , , and . ECRTS, volume 133 of LIPIcs, page 2:1-2:24. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Validating security protocols with cloud-based middleboxes., and . CNS, page 261-269. IEEE, (2016)A system for intelligent substitution of named entities with applications to the automatic generation of honey tokens., , and . CSIIRW, page 43. ACM, (2011)