Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Naïve transient cast insertion isn't (that) bad., , , , , and . ICOOOLPS@ECOOP, page 1-9. ACM, (2021)Toward Virtual Machine Adaption Rather than Reimplementation: Adapting SOMns for Grace, , , and . (Apr 3, 2017)When Certificate Transparency Is Too Transparent: Analyzing Information Leakage in HTTPS Domain Names., and . WPES@CCS, page 87-92. ACM, (2019)Tale Folks for Jung: Original fairytales for persons of all ages dramatizingC.G. Jung's archetypes of the collective unconscious. Vernal Equinox Press, San Anselmo, CA, (1983)Recommendations for the prevention of secondary Haemophilus influenzae type b (Hib) disease, , , , , , , and . Journal of Infection, 58 (1): 3--14 (January 2009)Social behavior and meningococcal carriage in British teenagers, , , , , , , , , and 1 other author(s). Emerging Infectious Diseases, 12 (6): 950--7 (June 2006)PMID: 16707051.From help desk and resnet to "Best Service Center in Town"., , , , and . SIGUCCS, page 27-32. ACM, (2008)You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates., , , , , and . ACM Conference on Computer and Communications Security, page 2489-2504. ACM, (2019)Saliency Diagrams., , , and . SIGGRAPH Asia Technical Briefs, page 49-52. ACM, (2019)As Advertised? Understanding the Impact of Influencer VPN Ads., , , , and . CoRR, (2024)