Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Imperfect forward secrecy: how Diffie-Hellman fails in practice., , , , , , , , , and 4 other author(s). Commun. ACM, 62 (1): 106-114 (2019)Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security., , , , , , , , , and . Internet Measurement Conference, page 27-39. ACM, (2015)Tracking Certificate Misissuance in the Wild., , , , , , , , , and . IEEE Symposium on Security and Privacy, page 785-798. IEEE Computer Society, (2018)Zippier ZMap: Internet-Wide Scanning at 10 Gbps., , , and . WOOT, USENIX Association, (2014)The Matter of Heartbleed., , , , , , , , , and 1 other author(s). Internet Measurement Conference, page 475-488. ACM, (2014)A Search Engine Backed by Internet-Wide Scanning., , , , and . ACM Conference on Computer and Communications Security, page 542-553. ACM, (2015)DROWN: Breaking TLS Using SSLv2., , , , , , , , , and 5 other author(s). USENIX Security Symposium, page 689-706. USENIX Association, (2016)Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication., , , , , , and . MobiHoc, page 257-266. ACM, (2015)Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice., , , , , , , , , and 4 other author(s). ACM Conference on Computer and Communications Security, page 5-17. ACM, (2015)Measuring small subgroup attacks against Diffie-Hellman., , , , , , , and . IACR Cryptology ePrint Archive, (2016)