Personensuche
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
Security Analysis of BigBlueButton and eduMEET:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
5
Poster: Circumventing the GFW with TLS Record Fragmentation:
, In:
?
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
6
Re-Envisioning Industrial Control Systems Security by Consi..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
7
Security Analysis of the 3MF Data Format:
, In:
?
2022 IEEE Security and Privacy Workshops (SPW) ,
8
On the Security of Parsing Security-Relevant HTTP Headers i..:
, In:
?
Challenges in Cybersecurity and Privacy - the European Research Landscape ,
9
FutureTrust – Future Trust Services for Trustworthy Global ..:
, In:
?
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security ,
12
Automated Detection of Side Channels in Cryptographic Proto..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
15