Personensuche
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
Security Analysis of BigBlueButton and eduMEET:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
5
Security Analysis of the 3MF Data Format:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
6
Poster: Circumventing the GFW with TLS Record Fragmentation:
, In:
?
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
7
Re-Envisioning Industrial Control Systems Security by Consi..:
, In:
?
2022 IEEE Security and Privacy Workshops (SPW) ,
8
On the Security of Parsing Security-Relevant HTTP Headers i..:
, In:
?
Challenges in Cybersecurity and Privacy - the European Research Landscape ,
9
FutureTrust – Future Trust Services for Trustworthy Global ..:
, In:
?
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security ,
10
Automated Detection of Side Channels in Cryptographic Proto..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
12
Mitigation of Attacks on Email End-to-End Encryption:
, In:
?
2018 IEEE European Symposium on Security and Privacy (EuroS&P) ,
13
Attacking Deterministic Signature Schemes Using Fault Attac..:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
14
Prime and Prejudice : Primality Testing Under Adversaria..:
, In:
?
Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium ,
15