Search

Your search keyword '"Amann, Johanna"' showing total 67 results

Search Constraints

Start Over You searched for: Author "Amann, Johanna" Remove constraint Author: "Amann, Johanna"
67 results on '"Amann, Johanna"'

Search Results

1. Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring

2. The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures

3. A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web

4. The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods

5. Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring

6. The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem

8. TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication

9. Measuring the Latency and Pervasiveness of TLS Certificate Revocation

10. Exploring Tor’s Activity Through Long-Term Passive TLS Traffic Measurement

11. Providing Dynamic Control to Passive Network Security Monitoring

12. Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks

13. A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence

22. Redundancy and Access Permissions in Decentralized File Systems

24. Coming of Age

25. Using loops observed in traceroute to infer the ability to spoof

26. On the potential of IPv6 open resolvers for DDoS attacks

27. Measuring Adoption of Security Additions to the HTTPS Ecosystem

28. Studying TLS Usage in Android Apps

29. Studying TLS Usage in Android Apps

30. Specification Mining for Intrusion Detection in Networked Control Systems

32. Spicy

36. A Tangled Mass

37. The Matter of Heartbleed

38. No attack necessary

42. A Characterization of Load Balancing on the IPv6 Internet

43. Where Has My Time Gone?

44. Enhancing WiFi Throughput with PLC Extenders: A Measurement Study

45. Why Is the Internet so Slow?!

46. Cutting Internet Access Costs Through HTTPS Caching: A Measurement Study

47. The Utility Argument – Making a Case for Broadband SLAs

48. Mind the Gap Between HTTP and HTTPS in Mobile Networks

49. A First Look at the CT Landscape: Certificate Transparency Logs in Practice

50. The Web, the Users, and the MOS: Influence of HTTP/2 on User Experience

Catalog

Books, media, physical & digital resources