Author of the publication

An End-to-End Measurement of Certificate Revocation in the Web's PKI.

, , , , , , , , and . Internet Measurement Conference, page 183-196. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Client-Side Web Proxy Detection from Unprivileged Mobile Devices., and . CoRR, (2015)When IPs Fly: A Case for Redefining Airline Communication., , and . HotMobile, page 9-14. ACM, (2016)On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service., , , , , , and . Internet Measurement Conference, page 127-133. ACM, (2016)Diagnosing Path Inflation of Mobile Client Traffic., , , , , , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 23-33. Springer, (2014)Investigating Interdomain Routing Policies in the Wild., , , , , and . Internet Measurement Conference, page 71-77. ACM, (2015)Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems., , and . INFOCOM, page 291-295. IEEE, (2010)ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes., , , , , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 105-125. Springer, (2022)Towards efficient traffic-analysis resistant anonymity networks., , , , , and . SIGCOMM, page 303-314. ACM, (2013)SoK: Attacks on Industrial Control Logic and Formal Verification-Based Defenses., , , and . EuroS&P, page 385-402. IEEE, (2021)Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild., , , , , , , , and . IMC, page 457-477. ACM, (2023)