Personensuche
X
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
3
Finding All Cross-Site Needles in the DOM Stack: A Comprehe..:
, In:
?
Digitalisierung der Arbeitswelt im Mittelstand 2 ,
4
Die digitale Zukunft im Handwerk gestalten: Entwicklung, Er..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
5
DISTINCT : Identity Theft using In-Browser Communication..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
6
XSinator.com: From a Formal Model to the Automatic Evaluati..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
7
Breaking the Specification: PDF Certification:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
8
Practical Decryption exFiltration : Breaking PDF Encrypt..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
9
1 Trillion Dollar Refund : How To Spoof PDF Signatures:
, In:
?
2018 IEEE European Symposium on Security and Privacy (EuroS&P) ,
11
More is Less: On the End-to-End Security of Group Chats in ..:
, In:
?
2017 IEEE European Symposium on Security and Privacy (EuroS&P) ,
12
SoK: Single Sign-On Security — An Evaluation of OpenID Conn..:
, In:
?
Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium ,
13
On The (In-)Security Of JavaScript Object Signing And Encry..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
14
SECRET : On the Feasibility of a Secure, Efficient, and ..:
, In:
?
2015 International Workshop on Secure Internet of Things (SIoT) ,
15