Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Client and Server Geolocation over the Internet., and . login Usenix Mag., (2018)Location Verification of Wireless Internet Clients: Evaluation and Improvements., , and . IEEE Trans. Emerg. Top. Comput., 5 (4): 563-575 (2017)Comparative Analysis of Control Plane Security of SDN and Conventional Networks., , and . IEEE Commun. Surv. Tutorials, 20 (4): 3542-3559 (2018)A survey on forensic event reconstruction systems., , and . Int. J. Inf. Comput. Secur., 9 (4): 337-360 (2017)Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients., , and . CNS, page 175-183. IEEE, (2014)UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband., , , and . USENIX Security Symposium, page 73-88. USENIX Association, (2019)Position Paper: Certificate Root Stores - An Area of Unity or Disparity?, , and . CSET @ USENIX Security Symposium, page 105-110. ACM, (2022)Accurate Manipulation of Delay-based Internet Geolocation., , and . AsiaCCS, page 887-898. ACM, (2017)3D Printed Dry Electrodes for Single-Lead Newborn ECG Monitoring., , and . CinC, page 1-4. IEEE, (2023)Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication., and . ACM Trans. Priv. Secur., 21 (1): 1:1-1:26 (2018)