Johanna Amann
Affiliations:- International Computer Science Institute, Berkeley, CA, USA
- Technical University of Munich, Germany (PhD 2011)
According to our database1,
Johanna Amann
authored at least 29 papers
between 2008 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on icir.org
On csauthors.net:
Bibliography
2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
2020
Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
Comput. Commun. Rev., 2020
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020
The Boon and Bane of Cross-Signing: Shedding Light on a Common Practice in Public Key Infrastructures.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
CoRR, 2019
2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the Applied Networking Research Workshop, 2018
2017
Proceedings of the 2017 Internet Measurement Conference, 2017
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016
Proceedings of the Passive and Active Measurement - 17th International Conference, 2016
TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Spicy: a unified deep packet inspection framework for safely dissecting all your data.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates.
Tiny Trans. Comput. Sci., 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
2011
2010
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010
2008