The following are some of our current research areas:
Haya Schulmann, Michael Waidner: (2024) Wie Deutschland zur Cybernation wird; Datenschutz und Datensicherheit (dud) 48(1) <https://dblp.org/db/journals/dud/dud48.html#SchulmannW24> : 11-15 (2024)
Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner: (2024) The CURE to Vulnerabilities in RPKI Validation; Network and Distributed System Security Symposium (NDSS 2024), San Diego, February 2024
Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner: (2024) Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms; USENIX Symposium in Networked Systems Design and Implementation (NSDI 2024), Santa Clara, USA, April 2024
Nethanel Gelernter, Haya Schulmann, Michael Waidner: (2024) External Attack-Surface of Modern Organizations; The 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS), Singapore, July 2024
Haya Schulmann, Michael Waidner: (2023) Aktive Cyberabwehr., Datenschutz und Datensicherheit 47(8): 497-502, Aug 2023
Jens Friess, Haya Schulmann, Michael Waidner: (2023) Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates., PACMNET 1(CoNEXT3): 26:1-26:20, Dez 2023
Fabian Kaiser, Haya Schulmann, Michael Waidner: (2023) Poster: Longitudinal Analysis of DoS Attacks. CCS 2023: 3573-3575, Nov 2023
Elias Heftrig, Haya Schulmann, Michael Waidner: (2023) Poster: Off-Path DNSSEC Downgrade Attacks., SIGCOMM 2023: 1120-1122, Sep 2023
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner: (2023) Beyond Limits: How to Disable Validators in Secure Networks., SIGCOMM 2023: 950-966, Sep 2023
Elias Heftrig, Haya Schulmann, Michael Waidner: (2023) Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones., USENIX Security Symposium 2023: 7429-7444, Aug 2023
Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner: (2023) Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet., USENIX Security Symposium 2023: 4841-4858, Aug 2023
Tomas Hlavacek, Haya Schulmann, Niklas Vogel, Michael Waidner: (2023) Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet., CoRR abs/2303.11772, Mar 2023
Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner: (2023)The CURE To Vulnerabilities in RPKI Validation., CoRR abs/2312.01872
Haya Schulmann, Michael Waidner: (2023) Intermezzo. Welcher Technologie kann man vertrauen?, Zeitschriftenaufsatz Kursbuch 59
Elisa Bertino, Haya Schulmann, Michael Waidner: Special issue ESORICS 2021. J. Comput. Secur. 30(6): 753-755 (2022)
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner: Behind the Scenes of RPKI. CCS 2022: 1413-1426
Elias Heftrig, Haya Schulmann, Michael Waidner: Poster: The Unintended Consequences of Algorithm Agility in DNSSEC. CCS 2022: 3363-3365
Donika Mirdita, Haya Schulmann, Michael Waidner: Poster: RPKI Kill Switch. CCS 2022: 3423-3425
Haya Schulmann, Niklas Vogel, Michael Waidner: Poster: Insights into Global Deployment of RPKI Validation. CCS 2022: 3467-3469
Haya Schulmann, Michael Waidner: Poster: DNS in Routers Considered Harmful. CCS 2022: 3471-3473
Tomas Hlavacek, Haya Schulmann, Michael Waidner: Smart RPKI Validation: Avoiding Errors and Preventing Hijacks. ESORICS (1) 2022: 509-530
Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Schulmann, Michael Waidner: Stalloris: RPKI Downgrade Attack. USENIX Security Symposium 2022: 4455-4471
Philipp Jeitner, Haya Schulmann, Lucas Teichmann, Michael Waidner: XDRI Attacks - and - How to Enhance Resilience of Residential Routers. USENIX Security Symposium 2022: 4473-4490
Tianxiang Dai, Haya Shulman, Michael Waidner: (2021) Let's Downgrade Let's Encrypt, Conference Paper, Nov 2021, DOI: 10.1145/3460120.3484815
Tianxiang Dai, Haya Shulman: (2021) SMap: Internet-wide Scanning for Spoofing, Conference Paper, Dec 2021, DOI: 10.1145/3485832.3485917
Kris Shrishak; Haya Shulman: (2021) Privacy Preserving and Resilient RPKI. IEEE International Conference on Computer Communications (INFOCOM), Virtual conference, 2021. [Conference Paper]
Philipp Jeitner; Haya Shulman: (2021) Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS. 30th USENIX Security Symposium (USENIX sec) , Virtual conference, August 2021. [Conference Paper]
Tianxiang Dai, Philipp Jeitner, Haya Shulman and Michael Waidner: (2021) The Hijackers Guide to the Galaxy: Off-Path Taking Over Internet Resources. 30th USENIX Security Symposium (USENIX Security), Virtual conference, August 2021.
Tianxiang Dai and Philipp Jeitner, Haya Shulman and Michael Waidner: (2021) From IP to Transport and Beyond: Cross Layer Attacks Against Applications, ACM SIGCOMM, Virtual conference, August 2021.
Lukas Baumann, Elias Heftrig, Haya Shulman and Michael Waidner: (2021) The Master and Parasite Attack, IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN), June 2021.
Kris Shrishak and Haya Shulman: (2021) Privacy Preserving and Resilient RPKI. In IEEE International Conference on Computer Communications (INFOCOM), 2021.
Haya Shulman and Hervais Simo: (2021) WallGuard - A Deep Learning Approach for Avoiding Regrettable Posts in Social Media. In The 41th IEEE International Conference on Distributed Computing Systems (ICDCS). Poster Session, 2021.
Tianxing Dai, Haya Shulman, and Michael Waidner: (2021) Off-path VoIP Interception Attacks. In The 41th IEEE International Conference on Distributed Computing Systems (ICDCS). Poster Session, 2021.
Tianxing Dai, Haya Shulman, and Michael Waidner: (2021) Fragmentation Attacks on DNS over TCP. In The 41th IEEE International Conference on Distributed Computing Systems (ICDCS). Poster Session, 2021.
Haya Shulman and Shujie Zhao: (2021) Machine Learning Analysis of IP ID Applications. In The 51th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Poster Session, 2021.
Kris Shrishak and Haya Shulman: (2021) Negotiating PQC for DNSSEC. In The 51th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Poster Session, 2021.
Hervais Simo, Haya Shulman, Joern Kohlhammer, Marija Schufrin, and Steven Reynolds: (2021) PrivInfer-Vis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.
Haya Shulman and Michael Waidner: (2021) SSL Checker. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.
Tomas Hlavacek, Haya Shulman, and Michael Waidner: (2021) Not all Conflicts are Created Equal: Automated Error Resolution in RPKI Deployments. In IEEE International Conference on Computer Communica-tions (INFOCOM). Poster Session, 2021.
Markus Brandt and Haya Shulman: (2021) Optimized BGP Simulator for Evaluation of Internet Hijacks. In IEEE International Conference on Computer Communications (INFOCOM). Poster Session, 2021.
Tianxiang Dai, Haya Shulman, Michael Waidner: Let's Downgrade Let's Encrypt. CCS 2021: 1421-1440
Elias Heftrig, Jean-Pierre Seifert, Haya Shulman, Michael Waidner, Nils Wisiol: Predictive Cipher-Suite Negotiation for Boosting Deployment of New Ciphers. CCS 2021: 2423-2425
Markus Brandt, Haya Shulman, Michael Waidner: Evaluating Resilience of Domains in PKI. CCS 2021: 2444-2446
Haya Shulman, Michael Waidner: SSLChecker. INFOCOM Workshops 2021: 1-2
Elisa Bertino, Haya Shulman, Michael Waidner: Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12972, Springer 2021, ISBN 978-3-030-88417-8 [contents]
Elisa Bertino, Haya Shulman, Michael Waidner: Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7 [contents]
Schneider, M.; Shulman, H.; Waidner, M.: (2020) Blocking Email Bombs with EmailGlass. In: 2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings, art. no. 9322348, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728182988, DOI: 10.1109/GLOBECOM42002.2020.9322348. [Conference Paper]
Senf, D.; Shulman, H.; Waidner, M.: (2020) Performance penalties of resilient SDN infrastructures. In: CoNEXT 2020 - Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies, pp. 528-529, Association for Computing Machinery, Inc, ISBN: 9781450379489, DOI: 10.1145/3386367.3432351. [Conference Paper]
Klein, A.; Heftrig, E.; Shulman, H.; Waidner, M.: (2020) Black-box caches fingerprinting. In: CoNEXT 2020 - Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies, pp. 564-565, Association for Computing Machinery, Inc, ISBN: 9781450379489, DOI: 10.1145/3386367.3432148. [Conference Paper]
Jeitner, P.; Shulman, H.; Waidner, M.: (2020) Pitfalls of provably secure systems in internet the case of chronos-NTP. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020, art. no. 9159158, pp. 49-50, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728172606, DOI: 10.1109/DSN-S50200.2020.00027. [Conference Paper]
Jeitner, P.; Shulman, H.; Waidner, M.: (2020) Secure consensus generation with distributed DoH. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020, art. no. 9159155, pp. 41-42, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728172606, DOI: 10.1109/DSN-S50200.2020.00023. [Conference Paper]
Jeitner, P.; Shulman, H.; Waidner, M.: (2020) The Impact of DNS Insecurity on Time. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020, art. no. 9153432, pp. 266-277, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728158099, DOI: 10.1109/DSN48063.2020.00043 [Conference Paper]
Schneider, M.; Shulman, H.; Sidis, A.; Sidis, R.; Waidner, M.: (2020) Diving into Email Bomb Attack. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020, art. no. 9153420, pp. 286-293, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728158099 DOI: 10.1109/DSN48063.2020.00045 [Conference Paper]
Shrishak, K.; Shulman, H.: (2020) Limiting the Power of RPKI Authorities. In: ANRW 2020 - Proceedings of the 2020 Applied Networking Research Workshop, pp. 12-18, Association for Computing Machinery, ISBN: 9781450380393 DOI: 10.1145/3404868.3406674 [Conference Paper]
Shrishak, K.; Shulman, H.: (2020) MPC for securing internet infrastructure. In: Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks: Supplemental Volume, DSN-S 2020, art. no. 9159160, pp. 47-48, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781728172606 DOI: 10.1109/DSN-S50200.2020.00026 [Conference Paper]
Dalskov, A.; Orlandi, C.; Keller, M.; Shrishak, K.; Shulman, H.: (2020) Securing dnssec keys via threshold ecdsa from generic mpc. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12309 LNCS, pp. 654-673, Springer Science and Business Media Deutschland GmbH, ISSN: 03029743, ISBN: 9783030590123 DOI: 10.1007/978-3-030-59013-0_32 [Conference Paper]
Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya: (2020) Optimal Transport Layer for Secure Computation. In: SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Konferenzveröffentlichung]
Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya: (2020) DISCO: Sidestepping RPKI's Deployment Barriers. Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Konferenzveröffentlichung]
Markus Brandt; Haya Shulman; Michael Waidner: (2019) Distributed Domain Validation (DDV). In: Cryptoday Matters 31, Berlin, Germany, 2019 [Article]
Anders Dalskov; Marcel Keller; Claudio Orlandi; Kris Shrishak; Haya Shulman: (2019) Securing DNSSEC Keys via Threshold ECDSA From Generic MPC. Cryptoday Matters 31, Berlin, Germany, 2019 [Article]
Markus Brandt; Claudio Orlandi; Kris Shrishak; Haya Shulman: (2019) Transputation: Transport Framework for Secure Computation. Cryptoday Matters 30, Berlin, Germany, 2019 [Article]
Brandt, M.; Shulman, H.; Waidner, M.: (2018) Internet as a source of randomness. In: HotNets 2018 - Proceedings of the 2018 ACM Workshop on Hot Topics in Networks, pp. 64-70, Association for Computing Machinery, Inc, ISBN: 9781450361200 DOI: 10.1145/3286062.3286072 [Conference Paper]
Brandt, M.; Dai, T.; Shulman, H.; Klein, A.; Waidner, M.: (2018) Domain Validation++ for MitM-resilient PKI. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 2060-2076, Association for Computing Machinery, ISSN: 15437221, ISBN: 9781450356930 DOI: 10.1145/3243734.3243790 [Conference Paper]
Göhring, M.; Shulman, H.; Waidner, M.: (2018) Path MTU discovery considered harmful. In: Proceedings - International Conference on Distributed Computing Systems, 2018-July, pp. 866-874, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781538668719 DOI: 10.1109/ICDCS.2018.00088 [Conference Paper]
Hlavacek, T.; Herzberg, A.; Shulman, H.; Waidner, M.: (2018) Practical experience: Methodologies for measuring route origin validation. In: Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, art. no. 8416522, pp. 634-641, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781538655955 DOI: 10.1109/DSN.2018.00070 [Conference Paper]
Gilad, Y.; Hlavacek, T.; Herzberg, A.; Schapira, M.; Shulman, H.: (2018) Perfect is the enemy of good: Setting realistic goals for BGP security. In: HotNets 2018 - Proceedings of the 2018 ACM Workshop on Hot Topics in Networks, pp. 57-63, Association for Computing Machinery, Inc, ISBN: 9781450361200 DOI: 10.1145/3286062.3286071 [Conference Paper]
Krish Shrishak; Haya Shulman; Michael Waidner: (2018) Poster: Removing the Bottleneck for Practical 2PC. In: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, October 2018. [Conference Paper]
Tianxiang Dai; Haya Shulman; Michael Waidner: (2018) Poster: Off-path Attacks Against PKI. In: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, October 2018. [Conference Paper]
Klein, A.; Kravtsov, V.; Perlmuter, A.; Shulman, H.; Waidner, M.: (2017) Poster: X-Ray your DNS. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 2519-2521, Association for Computing Machinery, ISSN: 15437221, ISBN: 9781450349468 DOI: 10.1145/3133956.3138821 [Conference Paper]
Klein, A.; Shulman, H.; Waidner, M.: (2017) Internet-wide study of DNS cache injections. In: Proceedings - IEEE INFOCOM, art. no. 8057202, Institute of Electrical and Electronics Engineers Inc., ISSN: 0743166X, ISBN: 9781509053360 DOI: 10.1109/INFOCOM.2017.8057202 [Conference Paper]
Klein, A.; Shulman, H.; Waidner, M.: (2017) Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. In: Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, art. no. 8023137, pp. 367-378, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781538605417 DOI: 10.1109/DSN.2017.63 [Conference Paper]
Rotenberg, N.; Shulman, H.; Waidner, M.; Zeltser, B.: (2017) Authentication-bypass vulnerabilities in SOHO routers. In: SIGCOMM Posters and Demos 2017 - Proceedings of the 2017 SIGCOMM Posters and Demos, Part of SIGCOMM 2017, pp. 68-70, Association for Computing Machinery, Inc, ISBN: 9781450350570 DOI: 10.1145/3123878.3131989 [Conference Paper]
Shulman, H.; Waidner, M.: (2017) One key to sign them all considered vulnerable: Evaluation of DnSsec in the internet. In: Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, pp. 131-144, USENIX Association, ISBN: 9781931971379 [Conference Paper]
Feldmann, A.; Heyder, P.; Kreutzer, M.; Schmid, S.; Seifert, J.-P.; Shulman, H.; Thimmaraju, K.; Waidner, M.; Sieberg, J.: (2016) NetCo: Reliable Routing with Unreliable Routers. In: Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2016, art. no. 7575362, pp. 128-135, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781467388917 DOI: 10.1109/DSN-W.2016.38 [Conference Paper]
Borgwart, A.; Shulman, H.; Waidner, M.: (2016) Towards Automated Measurements of Internet's Naming Infrastructure. In: Proceedings - 2016 IEEE International Conference on Software Science, Technology and Engineering, SwSTE 2016, art. no. 7515419, pp. 117-124, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781509010189 DOI: 10.1109/SWSTE.2016.25 [Conference Paper].
Ghiglieri, M.; Waidner, M.: (2016) HbbTV Security and Privacy: Issues and Challenges. In: IEEE Security and Privacy, 14 (3), art. no. 7478585, pp. 61-67, Institute of Electrical and Electronics Engineers Inc., ISSN: 15407993 DOI: 10.1109/MSP.2016.54 [Article]
Waidner, M.; Kasper, M.: (2016) Security in industrie 4.0 - Challenges and solutions for the fourth industrial revolution. In: Proceedings of the 2016 Design, Automation and Test in Europe Conference and Exhibition, DATE 2016, art. no. 7459511, pp. 1303-1308, Institute of Electrical and Electronics Engineers Inc., ISBN: 9783981537062 DOI: 10.3850/9783981537079_1005 [Conference Paper]
Shulman, H.; Waidner, M.: (2016) Is the internet ready for DNSSEC evaluating pitfalls in the naming infrastructure. In: Traffic Monitoring and Analysis - 8th International Workshop, TMA 2016, International Federation for Information Processing, IFIP, ISBN: 9783901882920 [Conference Paper]
Dai, T.; Shulman, H.; Waidner, M.: (2016) DNSSEC Misconfigurations in popular domains. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10052 LNCS, pp. 651-660, Springer Verlag, ISSN: 03029743, ISBN: 9783319489643 DOI: 10.1007/978-3-319-48965-0_43 [Conference Paper]
Shulman, H.; Waidner, M.: (2015) Towards security of internet naming infrastructure. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9326, pp. 3-22, Springer Verlag, ISSN: 03029743, ISBN: 9783319241739 DOI: 10.1007/978-3-319-24174-6_1 [Conference Paper]
Sadeghi, A.-R.; Wachsmann, C.; Waidner, M.: (2015) Security and privacy challenges in industrial Internet of Things. In: Proceedings - Design Automation Conference, 2015-July, art. no. 7167238, Institute of Electrical and Electronics Engineers Inc., ISSN: 0738100X, ISBN: 9781450335201 DOI: 10.1145/2744769.2747942 [Conference Paper]
Borgwart, A., Boukoros, S., Shulman, H., Van Rooyen, C., Waidner, M.: (2015) Detection and forensics of domains hijacking. In: 2015 IEEE Global Communications Conference, GLOBECOM 2015, art. no. 7417736, Institute of Electrical and Electronics Engineers Inc., ISBN: 9781479959525 DOI: 10.1109/GLOCOM.2014.7417736 [Conference Paper]
Herzberg, A.; Shulman, H.: (2015) Cipher-suite negotiation for DNSSEC: Hop-by-hop or end-to-end? In: IEEE Internet Computing, 19 (1), art. no. 7031814, pp. 80-84, Institute of Electrical and Electronics Engineers Inc., ISSN: 10897801 DOI: 10.1109/MIC.2015.3 [Article]
Shulman, H.; Waidner, M.: (2014) DNSSEC for cyber forensics. In: EURASIP Journal on Information Security, 2014 (1), art. no. 16, pp. 1-14, SpringerOpen, ISSN: 22113037 DOI: 10.1186/s13635-014-0016-2 [Article]
Shulman, H.; Waidner, M.: (2014) Towards forensic analysis of attacks with DNSSEC. In: Proceedings - IEEE Symposium on Security and Privacy, 2014-January, art. no. 6957288, pp. 69-76, Institute of Electrical and Electronics Engineers Inc., ISSN: 10816011, ISBN: 9781479951031 DOI: 10.1109/SPW.2014.20 [Conference Paper]
Shulman, H.; Waidner, M.: (2014) Fragmentation considered leaking: Port inference for DNS poisoning. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8479 LNCS, pp. 531-548, Springer Verlag, ISSN: 03029743, ISBN: 9783319075358; 9783319075358 DOI: 10.1007/978-3-319-07536-5_31 [Conference Paper]
Ghiglieri, M.; Stopczynski, M.; Waidner, M.: (2014) Personal DLP for facebook. In: 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014, art. no. 6815279, pp. 629-634, IEEE Computer Society DOI: 10.1109/PerComW.2014.6815279 [Conference Paper]
Herzberg, A.; Shulman, H.; Crispo, B.: (2014) Less is more: Cipher-suite negotiation for DNSSEC. In: ACM International Conference Proceeding Series, 2014-December (December), pp. 346-355, Association for Computing Machinery DOI: 10.1145/2664243.2664283 [Conference Paper]
Prof. Dr. Michael Waidner
michael.waidner@ tu-darmstadt.de
+49 6151 869-250
S2|02 B201
Hochschulstraße 10
64289 Darmstadt