Search for persons
X
?
ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology ,
1
Passive, Transparent, and Selective TLS Decryption for Netw..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
3
The Boon and Bane of Cross-Signing: Shedding Light on a Com..:
, In:
?
Proceedings of the Applied Networking Research Workshop ,
6
Measuring Adoption of Security Additions to the HTTPS Ecosy..:
, In:
?
Proceedings of the Internet Measurement Conference 2018 ,
7
The Rise of Certificate Transparency and Its Implications o..:
, In:
?
Proceedings of the Applied Networking Research Workshop ,
8
Studying TLS Usage in Android Apps:
, In:
?
Proceedings of the Internet Measurement Conference 2018 ,
9
Coming of Age : A Longitudinal Study of TLS Deployment:
, In:
?
10
Passive and Active Measurement
18th International Conference, PAM 2017, Sydney, NSW, Austr...
Lecture Notes in Computer Science ; 10176;SpringerLink, Bücher;Springer eBook Collection, Computer Science
?
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies ,
11
Studying TLS Usage in Android Apps:
, In:
?
Proceedings of the 2017 Internet Measurement Conference ,
12
Mission accomplished? : HTTPS security after diginotar:
, In:
?
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization ,
13
Viable Protection of High-Performance Networks through Hard..:
, In:
?
Proceedings of the 32nd Annual Conference on Computer Security Applications ,
14
Spicy : a unified deep packet inspection framework for s..:
, In:
?
Proceedings of the 2016 Internet Measurement Conference ,
15