Ralph Holz
Ralph Holz
Verified email at sydney.edu.au - Homepage
TitleCited byYear
The SSL landscape: a thorough analysis of the x. 509 PKI using active and passive measurements
R Holz, L Braun, N Kammenhuber, G Carle
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
P. Saint-Andre," Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
Y Sheffer, R Holz
BCP 195, RFC 7525, DOI 10.17487/RFC7525, May 2015,< http://www. rfc-editor …, 2015
X. 509 forensics: Detecting and localising the SSL/TLS men-in-the-middle
R Holz, T Riedmaier, N Kammenhuber, G Carle
european symposium on research in computer security, 217-234, 2012
Summarizing known attacks on transport layer security (TLS) and datagram TLS (DTLS)
Y Sheffer, R Holz, P Saint-Andre
RFC 7457, 2015
TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication
R Holz, J Amann, O Mehani, M Wachs, MA Kaafar
Network and Distributed System Security Symposium (NDSS), 2016
Mission accomplished?: HTTPS security after diginotar
J Amann, O Gasser, Q Scheitle, L Brent, G Carle, R Holz
Proceedings of the 2017 Internet Measurement Conference, 325-340, 2017
On availability for blockchain-based systems
I Weber, V Gramoli, A Ponomarev, M Staples, R Holz, AB Tran, P Rimba
2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 64-73, 2017
Securing a deployment pipeline
L Bass, R Holz, P Rimba, AB Tran, L Zhu
Proceedings of the Third International Workshop on Release Engineering, 4-7, 2015
New kids on the block: an analysis of modern blockchains
L Anderson, R Holz, A Ponomarev, P Rimba, I Weber
arXiv preprint arXiv:1606.06530, 2016
Vandal: A scalable security analysis framework for smart contracts
L Brent, A Jurisevic, M Kong, E Liu, F Gauthier, V Gramoli, R Holz, ...
arXiv preprint arXiv:1809.03981, 2018
Investigating the OpenPGP web of trust
A Ulrich, R Holz, P Hauck, G Carle
Computer Security–ESORICS 2011, 489-507, 2011
Spontaneous Virtual Networks: On the Road Towards the Internet's Next Generation
OP Waldhorst, C Blankenhorn, D Haage, R Holz, GG Koch, B Koldehofe, ...
IT-Information Technology 50 (6), 367, 2010
An early look at multipath TCP deployment in the wild
O Mehani, R Holz, S Ferlin, R Boreli
Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale …, 2015
A deeper understanding of SSH: results from Internet-wide scans
O Gasser, R Holz, G Carle
2014 IEEE Network Operations and Management Symposium (NOMS), 1-9, 2014
A first look at certification authority authorization (CAA)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
HEAP: reliable assessment of BGP hijacking attacks
J Schlamp, R Holz, Q Jacquemart, G Carle, EW Biersack
IEEE Journal on Selected Areas in Communications 34 (6), 1849-1861, 2016
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
A Fessi, N Evans, H Niedermayer, R Holz
Principles, Systems and Applications of IP Telecommunications, 134-145, 2010
Endpoint-transparent multipath transport with software-defined networks
D Banfi, O Mehani, G Jourjon, L Schwaighofer, R Holz
2016 IEEE 41st Conference on Local Computer Networks (LCN), 307-315, 2016
On using home networks and cloud computing for a future internet of things
H Niedermayer, R Holz, MO Pahl, G Carle
Future Internet Symposium, 70-80, 2009
Empirical analysis of Public Key Infrastructures and investigation of improvements
RG Holz
Technische Universität München, 2014
The system can't perform the operation now. Try again later.
Articles 1–20