Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OONI: Open Observatory of Network Interference., and . FOCI, USENIX Association, (2012)Toward secure name resolution on the internet., , , and . Computers & Security, (2018)Tiny WireGuard Tweak., , and . AFRICACRYPT, volume 11627 of Lecture Notes in Computer Science, page 3-20. Springer, (2019)Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate., , , , , , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 55-69. Springer, (2009)vpwns: Virtual Pwned Networks., , , and . FOCI, USENIX Association, (2012)Lest we remember: cold-boot attacks on encryption keys., , , , , , , , and . Commun. ACM, 52 (5): 91-98 (2009)The ".onion" Special-Use Domain Name., and . RFC, (October 2015)Lest We Remember: Cold Boot Attacks on Encryption Keys., , , , , , , , and . USENIX Security Symposium, page 45-60. USENIX Association, (2008)High Stakes: Designing a Privacy Preserving Registry., and . Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, page 27-43. Springer, (2012)