Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Partitioning the Internet., , and . CRiSIS, page 1-8. IEEE Computer Society, (2012)TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication., , , , and . CoRR, (2015)Toward secure name resolution on the internet., , , and . Computers & Security, (2018)Achieving Reproducible Network Environments with INSALATA., , , , , and . AIMS, volume 10356 of Lecture Notes in Computer Science, page 30-44. Springer, (2017)Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication., , and . ANRW, page 3. ACM, (2018)A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System., , and . CANS, volume 8813 of Lecture Notes in Computer Science, page 127-142. Springer, (2014)Analyzing Locality of Mobile Messaging Traffic using the MATAdOR Framework., , , and . CoRR, (2016)A secure and resilient communication infrastructure for decentralized networking applications.. Technical University Munich, (2015)TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication., , , , and . NDSS, The Internet Society, (2016)Automatic transport selection and resource allocation for resilient communication in decentralised networks., , and . P2P, page 1-5. IEEE, (2014)