Ralph Holz
Ralph Holz
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Vandal: A scalable security analysis framework for smart contracts
L Brent, A Jurisevic, M Kong, E Liu, F Gauthier, V Gramoli, R Holz, ...
arXiv preprint arXiv:1809.03981, 2018
The SSL landscape: a thorough analysis of the x. 509 PKI using active and passive measurements
R Holz, L Braun, N Kammenhuber, G Carle
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
On availability for blockchain-based systems
I Weber, V Gramoli, A Ponomarev, M Staples, R Holz, AB Tran, P Rimba
2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 64-73, 2017
P. Saint-Andre," Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
Y Sheffer, R Holz
BCP 195, RFC 7525, DOI 10.17487/RFC7525, May 2015,< http://www. rfc-editor …, 2015
Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis
Q Grundy, K Chiu, F Held, A Continella, L Bero, R Holz
bmj 364, 2019
Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS)
Y Sheffer, R Holz, P Saint-Andre
Mission accomplished? HTTPS security after DigiNotar
J Amann, O Gasser, Q Scheitle, L Brent, G Carle, R Holz
Proceedings of the 2017 Internet Measurement Conference, 325-340, 2017
TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication
R Holz, J Amann, O Mehani, M Wachs, MA Kaafar
Network and Distributed System Security Symposium (NDSS), 2016
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
R Holz, J Hiller, J Amann, A Razaghpanah, T Jost, N Vallina-Rodriguez, ...
ACM SIGCOMM Computer Communication Review 50 (3), 3-15, 2020
New kids on the block: an analysis of modern blockchains
L Anderson, R Holz, A Ponomarev, P Rimba, I Weber
arXiv preprint arXiv:1606.06530, 2016
The rise of certificate transparency and its implications on the internet ecosystem
Q Scheitle, O Gasser, T Nolte, J Amann, L Brent, G Carle, R Holz, ...
Proceedings of the Internet Measurement Conference 2018, 343-349, 2018
X. 509 forensics: Detecting and localising the SSL/TLS men-in-the-middle
R Holz, T Riedmaier, N Kammenhuber, G Carle
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
Securing a deployment pipeline
L Bass, R Holz, P Rimba, AB Tran, L Zhu
2015 IEEE/ACM 3rd International Workshop on Release Engineering, 4-7, 2015
Investigating the OpenPGP web of trust
A Ulrich, R Holz, P Hauck, G Carle
Computer Security–ESORICS 2011, 489-507, 2011
HEAP: reliable assessment of BGP hijacking attacks
J Schlamp, R Holz, Q Jacquemart, G Carle, EW Biersack
IEEE Journal on Selected Areas in Communications 34 (6), 1849-1861, 2016
A first look at certification authority authorization (CAA)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
On the origin of scanning: The impact of location on internet-wide scans
G Wan, L Izhikevich, D Adrian, K Yoshioka, R Holz, C Rossow, ...
Proceedings of the ACM Internet Measurement Conference, 662-679, 2020
A responsible internet to increase trust in the digital world
C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ...
Journal of Network and Systems Management 28, 882-922, 2020
A deeper understanding of SSH: Results from Internet-wide scans
O Gasser, R Holz, G Carle
2014 IEEE Network Operations and Management Symposium (NOMS), 1-9, 2014
In log we trust: Revealing poor security practices with certificate transparency logs and internet measurements
O Gasser, B Hof, M Helm, M Korczynski, R Holz, G Carle
Passive and Active Measurement: 19th International Conference, PAM 2018 …, 2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20