| 2022 | |
| [3] | The Complete Guide to SCION. From Design Principles to Formal Verification  Publisher: Springer International Publishing AG, 2022.  | 
| 2017 | |
| [2] | SCION: A Secure Internet Architecture (Open Access PDF)  , 2017.  | 
| [1] | SCION: A Secure Internet Architecture (Springer)  Publisher: Springer International Publishing AG, 2017.  | 
| 2021 | |
| [14] | Global Distributed Secure Mapping of Network Addresses  In Proceedings of the ACM SIGCOMM Workshop on Technologies, Applications, and Uses of a Responsible Internet (TAURIN), August 2021.  | 
| [13] | Formal Verification of Secure Forwarding Protocols  In Proceedings of the 34th IEEE Computer Security Foundations (CSF) Symposium, June 2021.  | 
| [12] | An Axiomatic Perspective on the Performance Effects of End-Host Path Selection  In Proceedings of the International Symposium on Computer Performance, Modeling, Measurements and Evaluation (PERFORMANCE), 2021.  | 
| [11] | Deployment and Scalability of an Inter-Domain Multi-Path Routing Infrastructure  In International Conference on emerging Networking EXperiments and Technologies (CoNEXT ’21), 2021. (Best Paper Award)  | 
| [10] | Colibri: A Cooperative Lightweight Inter-domain Bandwidth-Reservation Infrastructure  In International Conference on emerging Networking EXperiments and Technologies (CoNEXT ’21), 2021.  | 
| [9] | LINC: Low-Cost Inter-Domain Connectivity for Industrial Systems  In Proceedings of the ACM SIGCOMM Demo's and Posters, 2021.  | 
| 2020 | |
| [8] | EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet  In Proceedings of the 29th USENIX Security Symposium, August 2020.  | 
| [7] | The Value of Information in Selfish Routing  In Proceedings of the 27th International Colloquium on Structural Information and Communication Complexity (SIROCCO), June 2020.  | 
| 2017 | |
| [6] | The SCION Internet Architecture  In Communications of the ACM 60 (6), June 2017. (Preprint)  | 
| [5] | Deadline-Aware Multipath Communication: An Optimization Problem  In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2017.  | 
| 2016 | |
| [4] | Modeling Data-Plane Power Consumption of Future Internet Architectures  In Proceedings of the IEEE Conference on Collaboration and Internet Computing (CIC), November 2016.  | 
| 2015 | |
| [3] | SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks  In arXiv e-prints, August 2015.  | 
| [2] | Source-Based Path Selection: The Data Plane Perspective  In Proceedings of the ACM Conference on Future Internet Technologies (CFI), June 2015.  | 
| 2011 | |
| [1] | SCION: Scalability, Control, and Isolation On Next-Generation Networks  In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2011.  | 
| 2015 | |
| [2] | FAIR: Forwarding Accountability for Internet Reputability  In Proceedings of the IEEE International Conference on Network Protocols (ICNP), November 2015.  | 
| [1] | Forwarding Accountability: A Challenging Necessity of the Future Data Plane  In Proceedings of the IFIP WG 11.4 Workshop on Open Research Problems in Network Security (iNetSec), October 2015.  | 
| 2020 | |
| [10] | SVLAN: Secure & Scalable Network Virtualization  In Proceedings of the Symposium on Network and Distributed System Security (NDSS), 2020.  | 
| 2017 | |
| [9] | Internet Kill Switches Demystified  In Proceedings of the European Workshop on Systems Security (EuroSec), April 2017.  | 
| 2016 | |
| [8] | CASTLE: CA Signing in a Touch-Less Environment  In Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2016.  | 
| [7] | Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure  In IEEE Transactions on Dependable and Secure Computing (TDSC), October 2016.  | 
| [6] | PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem  In Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P), March 2016.  | 
| 2015 | |
| [5] | Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs  In Proceedings of the IEEE Conference on Communications and Network Security (CNS), September 2015.  | 
| 2014 | |
| [4] | ARPKI: Attack Resilient Public-Key Infrastructure  In Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2014.  | 
| [3] | PoliCert: Secure and Flexible TLS Certificate Management  In Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2014.  | 
| [2] | Mechanized Network Origin and Path Authenticity Proofs  In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), November 2014.  | 
| [1] | Lightweight Source Authentication and Path Validation  In Proceedings of the ACM SIGCOMM Conference, August 2014.  | 
| 2017 | |
| [5] | PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer  In Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017.  | 
| 2016 | |
| [4] | Source Accountability with Domain-brokered Privacy  In Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT), December 2016.  | 
| [3] | Communication Based on Per-Packet One-Time Addresses  In Proceedings of the IEEE Conference on Network Protocols (ICNP), November 2016.  | 
| 2015 | |
| [2] | On Building Onion Routing into Future Internet Architectures  In Proceedings of the IFIP WG 11.4 Workshop on Open Research Problems in Network Security (iNetSec), October 2015.  | 
| [1] | HORNET: High-speed Onion Routing at the Network Layer  In Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2015.  | 
| 2022 | |
| [4] | N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures  In Proceedings of IEEE Computer Security Foundations Symposium (CSF), 2022. ("Extended Version")  | 
| 2020 | |
| [3] | PISKES: Pragmatic Internet-Scale Key-Establishment System  In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS'20), 2020.  | 
| 2017 | |
| [2] | The Case for In-Network Replay Suppression  In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), April 2017.  | 
| 2016 | |
| [1] | SIBRA: Scalable Internet Bandwidth Reservation Architecture  In Proceedings of the Symposium on Network and Distributed System Security (NDSS), February 2016.  | 
| 2020 | |
| [1] | Internet Backbones in Space  In SIGCOMM Comput. Commun. Rev. 50 (1), jan 2020.  |