An Investigation of Geographic Mapping Techniques for Internet Hosts (Paper) Distributed Traceroute Approach to Geographically Located IP Devices (Paper)
CPV: Delay-based Location Verification for the Internet (Paper) Method and systems for locating geographical locations of online users (Patent)
Dude, where’s that IP? Circumventing measurement-based IP geolocation (Paper) Accurate Manipulation of Delay-based Internet Geolocation (Paper)
Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments (Paper) Evaluating Behavioral Biometrics for Continuous Authentication (Paper)
Mobile Security
XApp: Unauthorized Cross-App Resource Access on MAC OS X and iOS (Paper) Angriff auf Sparkassen TAN-App (Informationen, zweiter Angriff) On App-based Matrix Code Authentication in Online Banking (Paper, News)
HTTP Strict Transport Security (HSTS, News1, News2, Attack) HTTP Public Key Pinning (HPKP) CA & Pinning list administration in browsers like Firefox, Chrome, Safari, and Internet Explorer (Mozilla, News) DigiNotar Attack (News)
Security of Adobe Flash and Silverlight over the last 10 years (Start)
Web of Trust Services (Website, News1, News2, iX 01/17:54, Web of Trust) [Experiments] Privacy and Web Robots (c't 2017/13-168, c't 2017/12-170) [Experiments]
Non-Interactive Zero-Knowledge and Its Applications (Paper) Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack (Paper)
How To Prove Yourself: Practical Solutions to Identification and Signature Problems (Paper) Publicly Verifiable Non-Interactive Zero-Knowledge Proofs (Paper)
In order to improve performance and enhance the user experience for the visitors to our website, we use cookies and store anonymous usage data. For more information please read our privacy policy.