Author of the publication

Domain Impersonation is Feasible: A Study of CA Domain Validation Vulnerabilities.

, , and . EuroS&P, page 544-559. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain Impersonation is Feasible: A Study of CA Domain Validation Vulnerabilities., , and . EuroS&P, page 544-559. IEEE, (2019)NTALG - TCP NAT Traversal with Application-Level Gateways(Demonstration), , , and . 9th IEEE Consumer Communications and Networking Conference, CCNC 2012, Las Vegas, Nevada, USA, (14 - 17 01 2012)Diploma Thesis: Design, prototypische Entwicklung und Evaluation einer sicheren Kommunikationsmethode. Universität Duisburg-Essen, (2008)A New Protocol to Determine the NAT Characteristics of a Host, , , , and . Proceedings of the 8th International Workshop on Hot Topics in Peer-to-Peer Systems, HotP2P 2011, held in conjunction with the 25th IEEE International Parallel & Distributed Processing Symposium, IPDPS 2011, Anchorage, Alaska, USA, (16-20 05 2011)An Architecture for Complex Peer-to-Peer Systems, , , and . Proceedings of the 4th IEEE International Workshop on Digital Entertainment, Networked Virtual Environments, and Creative Technology, DENVECT 2012, held in conjunction with the IEEE Consumer Communications and Networking Conference, CCNC 2012, Las Vegas, Nevada, USA, (14 - 17 01 2012)USA January 14-17, 2012(to appear).Mobile Devices as Digital Sextants for Zero-Permission Geolocation., , and . ICISSP, page 55-66. SciTePress, (2019)Model-Driven Development of Self-Organizing Control Applications. Chapter 2.1, in Organic Computing - A Paradigm Shift for Complex Systems, , , , , , , , , and . Birkäuser Verlag, (Jun 14, 2011)