This file was created by the TYPO3 extension
bib
--- Timezone: CEST
Creation date: 2024-07-04
Creation time: 05-26-35
--- Number of references
10
inproceedings
2018-zimmermann-webready
Is the Web ready for HTTP/2 Server Push?
2018
12
4
maki
https://dl.acm.org/citation.cfm?id=3281434
https://arxiv.org/abs/1810.05554
https://http2.netray.io/interleaving.html
ACM
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies (CoNEXT), Crete, Greete
Crete, Greece
CoNEXT 2018
4.12.18 - 7.12.18
en
10.1145/3281411.3281434
1
TorstenZimmermann
BenediktWolters
OliverHohlfeld
KlausWehrle
inproceedings
2018-rueth-mining
Digging into Browser-based Crypto Mining
2018
10
31
maki,internet-measurements
http://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-mining.pdf
https://arxiv.org/abs/1808.00811
ACM
Proceedings of the Internet Measurement Conference (IMC '18)
Boston, US
Internet Measurement Conference 2018
31.10.18 - 2.11.18
en
10.1145/3278532.3278539
1
JanRüth
TorstenZimmermann
KonradWolsing
OliverHohlfeld
inproceedings
2018-tzimmermann-toplists
A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists
2018
10
31
maki
https://dl.acm.org/citation.cfm?id=3278574
https://arxiv.org/abs/1805.11506
ACM
Proceedings of the 2018 Internet Measurement Conference (IMC), Boston, USA
Boston, US
Internet Measurement Conference 2018
31.10.18 - 2.11.18
en
10.1145/3278532.3278574
1
QuirinScheitle
OliverHohlfeld
JulienGamba
JonasJelten
TorstenZimmermann
Stephen D.Strowes
NarseoVallina-Rodriguez
inproceedings
2018-hohlfeld-santa
Application-Agnostic Offloading of Datagram Processing
2018
9
3
maki,ssiclops,reflexes
https://ieeexplore.ieee.org/document/8493053
IEEE
Proceedings of the 2018 30th International Teletraffic Congress (ITC 30), Vienna, Austria
Vienna, Austria
International Teletraffic Congress ITC 30
03.09.2018 - 07-09.2018
en
10.1109/ITC30.2018.00015
1
OliverHohlfeld
Jens HelgeReelfs
JanRüth
FlorianSchmidt
TorstenZimmermann
JensHiller
KlausWehrle
inproceedings
2018-rueth-iwcdns
Demystifying TCP Initial Window Configurations of Content Distribution Networks
2018
6
26
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-iwcdns.pdf
https://arxiv.org/abs/1902.08937
http://tma.ifip.org/2018/wp-content/uploads/sites/3/2018/06/tma2018_paper13.pdf
In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA '18)
Vienna, Austria
Network Traffic Measurement and Analysis Conference (TMA'18)
26.06.2018 - 29.06.2018
10.23919/TMA.2018.8506549
1
JanRüth
OliverHohlfeld
inproceedings
2018-hiller-ic2e-cpplintegration
Giving Customers Control over Their Data: Integrating a Policy Language into the Cloud
2018
4
19
241-249
ssiclops,iop
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hiller-ic2e-policy-aware-cloud.pdf
https://ieeexplore.ieee.org/document/8360335
IEEE
Proceedings of the 2018 IEEE International Conference on Cloud Engineering (IC2E 2018), Orlando, Florida, USA
Orlando, Florida, USA
2018 IEEE International Conference on Cloud Engineering (IC2E 2018)
2018-04-19
978-1-5386-5008-0
10.1109/IC2E.2018.00050
1
JensHiller
MaelKimmerlin
MaxPlauth
SeppoHeikkila
StefanKlauck
VilleLindfors
FelixEberhardt
DariuszBursztynowski
Jesus LlorenteSantos
OliverHohlfeld
KlausWehrle
article
2018-scheitle-ccr-caa
A First Look at Certification Authority Authorization (CAA)
ACM SIGCOMM Computer Communications Review (CCR)
2018
4
48
10-23
https://www.net.in.tum.de/fileadmin/bibtex/publications/papers/caa17.pdf
internet-measurements
https://ccronline.sigcomm.org/wp-content/uploads/2018/05/sigcomm-ccr-final163.pdf
https://ccronline.sigcomm.org/2018/a-first-look-at-certification-authority-authorization-caa/
2018-06-05
10.1145/3213232.3213235
1
QuirinScheitle
TaejoongChung
JensHiller
OliverGasser
JohannesNaab
Rolandvan Rijswijk-Deij
OliverHohlfeld
RalphHolz
DaveChoffnes
AlanMislove
GeorgCarle
inproceedings
2018-rueth-quicadoptionstudy
A First Look at QUIC in the Wild
2018
3
26
255-268
maki,reflexes
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-rueth-quicadoptionstudy.pdf
https://arxiv.org/abs/1801.05168
Springer, Cham
In Proceedings of the Passive and Active Measurement Conference (PAM '18)
Berlin, Germany
Passive and Active Measurement Conference (PAM 2018)
26.3.2018 - 27.3.2018
en
978-3-319-76481-8
10.1007/978-3-319-76481-8_19
1
JanRüth
IngmarPoese
ChristophDietzel
OliverHohlfeld
inproceedings
2018-tzimmermann-metacdn
Characterizing a Meta-CDN
2018
3
26
114-128
maki
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018-hohlfeld-metacdn.pdf
https://arxiv.org/abs/1803.09990
Springer, Cham
In Proceedings of the Passive and Active Measurement Conference (PAM '18)
Berlin, Germany
Passive and Active Measurement Conference (PAM 2018)
26.3.2018 - 27.3.2018
en
978-3-319-76480-1
10.1007/978-3-319-76481-8_9
1
OliverHohlfeld
JanRüth
KonradWolsing
TorstenZimmermann
inproceedings
2018-matzutt-bitcoin-content
A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
2018
2
26
Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly.
mynedata
https://www.comsys.rwth-aachen.de/fileadmin/papers/2018/2018_matzutt_bitcoin-contents_preproceedings-version.pdf
2018-01-07
Online
Springer
Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC), Nieuwpoort, Curaçao
Nieuwpoort, Curaçao
Financial Cryptography and Data Security 2018
en
10.1007/978-3-662-58387-6_23
1
RomanMatzutt
JensHiller
MartinHenze
Jan HenrikZiegeldorf
DirkMüllmann
OliverHohlfeld
KlausWehrle