Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aktive Cyberabwehr., and . Datenschutz und Datensicherheit, 47 (8): 497-502 (2023)Removing the Bottleneck for Practical 2PC., , and . CCS, page 2300-2302. ACM, (2018)Black-box caches fingerprinting., , , and . CoNEXT, page 564-565. ACM, (2020)Poster: RPKI Kill Switch., , and . CCS, page 3423-3425. ACM, (2022)Behind the Scenes of RPKI., , , , and . CCS, page 1413-1426. ACM, (2022)Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure., and . TMA, IFIP, (2016)Performance penalties of resilient SDN infrastructures., , and . CoNEXT, page 528-529. ACM, (2020)Fragmentation Considered Leaking: Port Inference for DNS Poisoning., and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 531-548. Springer, (2014)Diving into Email Bomb Attack., , , , and . DSN, page 286-293. IEEE, (2020)Path MTU Discovery Considered Harmful., , and . ICDCS, page 866-874. IEEE Computer Society, (2018)