Ralph Holz
Ralph Holz
Verified email at sydney.edu.au - Homepage
TitleCited byYear
The SSL landscape: a thorough analysis of the x. 509 PKI using active and passive measurements
R Holz, L Braun, N Kammenhuber, G Carle
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
1892011
P. Saint-Andre," Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
Y Sheffer, R Holz
BCP 195, RFC 7525, DOI 10.17487/RFC7525, May 2015,< http://www. rfc-editor …, 2015
114*2015
X. 509 forensics: Detecting and localising the SSL/TLS men-in-the-middle
R Holz, T Riedmaier, N Kammenhuber, G Carle
european symposium on research in computer security, 217-234, 2012
612012
Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS)
Y Sheffer, R Holz, P Saint-Andre
RFC 7457, 2015
582015
TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication
R Holz, J Amann, O Mehani, M Wachs, MA Kaafar
Network and Distributed System Security Symposium (NDSS), 2016
502016
Mission accomplished?: HTTPS security after diginotar
J Amann, O Gasser, Q Scheitle, L Brent, G Carle, R Holz
Proceedings of the 2017 Internet Measurement Conference, 325-340, 2017
362017
On availability for blockchain-based systems
I Weber, V Gramoli, A Ponomarev, M Staples, R Holz, AB Tran, P Rimba
2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 64-73, 2017
362017
Securing a deployment pipeline
L Bass, R Holz, P Rimba, AB Tran, L Zhu
Proceedings of the Third International Workshop on Release Engineering, 4-7, 2015
362015
New kids on the block: an analysis of modern blockchains
L Anderson, R Holz, A Ponomarev, P Rimba, I Weber
arXiv preprint arXiv:1606.06530, 2016
352016
Vandal: A scalable security analysis framework for smart contracts
L Brent, A Jurisevic, M Kong, E Liu, F Gauthier, V Gramoli, R Holz, ...
arXiv preprint arXiv:1809.03981, 2018
312018
Investigating the OpenPGP web of trust
A Ulrich, R Holz, P Hauck, G Carle
Computer Security–ESORICS 2011, 489-507, 2011
262011
Spontaneous Virtual Networks: On the Road Towards the Internet's Next Generation
OP Waldhorst, C Blankenhorn, D Haage, R Holz, GG Koch, B Koldehofe, ...
IT-Information Technology 50 (6), 367, 2010
19*2010
An early look at multipath TCP deployment in the wild
O Mehani, R Holz, S Ferlin, R Boreli
Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale …, 2015
182015
A deeper understanding of SSH: results from Internet-wide scans
O Gasser, R Holz, G Carle
2014 IEEE Network Operations and Management Symposium (NOMS), 1-9, 2014
172014
A first look at certification authority authorization (CAA)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
152018
HEAP: reliable assessment of BGP hijacking attacks
J Schlamp, R Holz, Q Jacquemart, G Carle, EW Biersack
IEEE Journal on Selected Areas in Communications 34 (6), 1849-1861, 2016
152016
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
A Fessi, N Evans, H Niedermayer, R Holz
Principles, Systems and Applications of IP Telecommunications, 134-145, 2010
112010
Endpoint-transparent multipath transport with software-defined networks
D Banfi, O Mehani, G Jourjon, L Schwaighofer, R Holz
2016 IEEE 41st Conference on Local Computer Networks (LCN), 307-315, 2016
92016
On using home networks and cloud computing for a future internet of things
H Niedermayer, R Holz, MO Pahl, G Carle
Future Internet Symposium, 70-80, 2009
92009
Empirical analysis of Public Key Infrastructures and investigation of improvements
RG Holz
Technische Universität München, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–20