Author of the publication

A Survey of Voice over IP Security Research.

. ICISS, volume 5905 of Lecture Notes in Computer Science, page 1-17. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pushback for Overlay Networks: Protecting Against Malicious Insiders., , and . ACNS, volume 5037 of Lecture Notes in Computer Science, page 39-54. (2008)W3Bcrypt: Encryption as a Stylesheet., , and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 349-364. (2006)On the General Applicability of Instruction-Set Randomization., , , , and . IEEE Trans. Dependable Secur. Comput., 7 (3): 255-270 (2010)Ethics in Security Vulnerability Research., , , and . IEEE Secur. Priv., 8 (2): 67-72 (2010)Randomized Instruction Sets and Runtime Environments Past Research and Future Directions.. IEEE Secur. Priv., 7 (1): 18-25 (2009)Worm Propagation Strategies in an IPv6 Internet., , and . login Usenix Mag., (2006)Tug-of-War: Observations on Unified Content Handling., , , , , and . CoRR, (2017)Self-healing multitier architectures using cascading rescue points., , and . ACSAC, page 379-388. ACM, (2012)IntFlow: improving the accuracy of arithmetic error detection using information flow tracking., , , , and . ACSAC, page 416-425. ACM, (2014)That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms., , and . WPES@CCS, page 71-81. ACM, (2016)