2022 | |
[3] | The Complete Guide to SCION. From Design Principles to Formal Verification Publisher: Springer International Publishing AG, 2022. |
2017 | |
[2] | SCION: A Secure Internet Architecture (Open Access PDF) , 2017. |
[1] | SCION: A Secure Internet Architecture (Springer) Publisher: Springer International Publishing AG, 2017. |
2021 | |
[14] | Global Distributed Secure Mapping of Network Addresses In Proceedings of the ACM SIGCOMM Workshop on Technologies, Applications, and Uses of a Responsible Internet (TAURIN), August 2021. |
[13] | Formal Verification of Secure Forwarding Protocols In Proceedings of the 34th IEEE Computer Security Foundations (CSF) Symposium, June 2021. |
[12] | An Axiomatic Perspective on the Performance Effects of End-Host Path Selection In Proceedings of the International Symposium on Computer Performance, Modeling, Measurements and Evaluation (PERFORMANCE), 2021. |
[11] | Deployment and Scalability of an Inter-Domain Multi-Path Routing Infrastructure In International Conference on emerging Networking EXperiments and Technologies (CoNEXT ’21), 2021. (Best Paper Award) |
[10] | Colibri: A Cooperative Lightweight Inter-domain Bandwidth-Reservation Infrastructure In International Conference on emerging Networking EXperiments and Technologies (CoNEXT ’21), 2021. |
[9] | LINC: Low-Cost Inter-Domain Connectivity for Industrial Systems In Proceedings of the ACM SIGCOMM Demo's and Posters, 2021. |
2020 | |
[8] | EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet In Proceedings of the 29th USENIX Security Symposium, August 2020. |
[7] | The Value of Information in Selfish Routing In Proceedings of the 27th International Colloquium on Structural Information and Communication Complexity (SIROCCO), June 2020. |
2017 | |
[6] | The SCION Internet Architecture In Communications of the ACM 60 (6), June 2017. (Preprint) |
[5] | Deadline-Aware Multipath Communication: An Optimization Problem In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2017. |
2016 | |
[4] | Modeling Data-Plane Power Consumption of Future Internet Architectures In Proceedings of the IEEE Conference on Collaboration and Internet Computing (CIC), November 2016. |
2015 | |
[3] | SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks In arXiv e-prints, August 2015. |
[2] | Source-Based Path Selection: The Data Plane Perspective In Proceedings of the ACM Conference on Future Internet Technologies (CFI), June 2015. |
2011 | |
[1] | SCION: Scalability, Control, and Isolation On Next-Generation Networks In Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2011. |
2015 | |
[2] | FAIR: Forwarding Accountability for Internet Reputability In Proceedings of the IEEE International Conference on Network Protocols (ICNP), November 2015. |
[1] | Forwarding Accountability: A Challenging Necessity of the Future Data Plane In Proceedings of the IFIP WG 11.4 Workshop on Open Research Problems in Network Security (iNetSec), October 2015. |
2020 | |
[10] | SVLAN: Secure & Scalable Network Virtualization In Proceedings of the Symposium on Network and Distributed System Security (NDSS), 2020. |
2017 | |
[9] | Internet Kill Switches Demystified In Proceedings of the European Workshop on Systems Security (EuroSec), April 2017. |
2016 | |
[8] | CASTLE: CA Signing in a Touch-Less Environment In Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2016. |
[7] | Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure In IEEE Transactions on Dependable and Secure Computing (TDSC), October 2016. |
[6] | PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem In Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P), March 2016. |
2015 | |
[5] | Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs In Proceedings of the IEEE Conference on Communications and Network Security (CNS), September 2015. |
2014 | |
[4] | ARPKI: Attack Resilient Public-Key Infrastructure In Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2014. |
[3] | PoliCert: Secure and Flexible TLS Certificate Management In Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2014. |
[2] | Mechanized Network Origin and Path Authenticity Proofs In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), November 2014. |
[1] | Lightweight Source Authentication and Path Validation In Proceedings of the ACM SIGCOMM Conference, August 2014. |
2017 | |
[5] | PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer In Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017. |
2016 | |
[4] | Source Accountability with Domain-brokered Privacy In Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT), December 2016. |
[3] | Communication Based on Per-Packet One-Time Addresses In Proceedings of the IEEE Conference on Network Protocols (ICNP), November 2016. |
2015 | |
[2] | On Building Onion Routing into Future Internet Architectures In Proceedings of the IFIP WG 11.4 Workshop on Open Research Problems in Network Security (iNetSec), October 2015. |
[1] | HORNET: High-speed Onion Routing at the Network Layer In Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2015. |
2022 | |
[4] | N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures In Proceedings of IEEE Computer Security Foundations Symposium (CSF), 2022. ("Extended Version") |
2020 | |
[3] | PISKES: Pragmatic Internet-Scale Key-Establishment System In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS'20), 2020. |
2017 | |
[2] | The Case for In-Network Replay Suppression In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), April 2017. |
2016 | |
[1] | SIBRA: Scalable Internet Bandwidth Reservation Architecture In Proceedings of the Symposium on Network and Distributed System Security (NDSS), February 2016. |
2020 | |
[1] | Internet Backbones in Space In SIGCOMM Comput. Commun. Rev. 50 (1), jan 2020. |