An Investigation of Geographic Mapping Techniques for Internet Hosts (Paper) Distributed Traceroute Approach to Geographically Located IP Devices (Paper)
CPV: Delay-based Location Verification for the Internet (Paper) Method and systems for locating geographical locations of online users (Patent)
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud (News, Paper1, Paper2, Paper3, Talk)+
Biometric Security
Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments (Paper) Evaluating Behavioral Biometrics for Continuous Authentication (Paper)
Mobile Security
XApp: Unauthorized Cross-App Resource Access on MAC OS X and iOS (Paper) Angriff auf Sparkassen TAN-App (Informationen, zweiter Angriff) On App-based Matrix Code Authentication in Online Banking (Paper, News)
HTTP Strict Transport Security (HSTS, News1, News2, Attack) HTTP Public Key Pinning (HPKP) CA & Pinning list administration in browsers like Firefox, Chrome, Safari, and Internet Explorer (Mozilla, News) DigiNotar Attack (News)
Web of Trust Services (Website, News1, News2, iX 01/17:54, Web of Trust) [Experiments] Privacy and Web Robots (c't 2017/13–168, c't 2017/12–170) [Experiments]
How To Prove Yourself: Practical Solutions to Identification and Signature Problems (Paper) Publicly Verifiable Non-Interactive Zero-Knowledge Proofs (Paper)
In order to improve performance and enhance the user experience for the visitors to our website, we use cookies and store anonymous usage data. For more information please read our privacy policy.