default search action
Ralph Holz
Person information
- affiliation: University of Sydney, School of IT, NSW, Australia
- affiliation: TU Munich, Faculty of Computer Science, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Shyam Krishna Khadka, Suzan Bayhan, Ralph Holz, Cristian Hesselman:
Assessing the security of Internet paths: A case study of Dutch critical infrastructures. ANRW 2024 - [c29]Niousha Nazemi, Omid Tavallaie, Shuaijun Chen, Albert Y. Zomaya, Ralph Holz:
Boosting Communication Efficiency of Federated Learning's Secure Aggregation. DSN-S 2024: 157-158 - [c28]Jonas Kaspereit, Gurur Öndarö, Gustavo Luvizotto Cesar, Simon Ebbers, Fabian Ising, Christoph Saatjohann, Mattijs Jonker, Ralph Holz, Sebastian Schinzel:
LanDscAPe: Exploring LDAP weaknesses and data leaks at Internet scale. USENIX Security Symposium 2024 - [i17]Niousha Nazemi, Omid Tavallaie, Shuaijun Chen, Albert Y. Zomaya, Ralph Holz:
Boosting Communication Efficiency of Federated Learning's Secure Aggregation. CoRR abs/2405.01144 (2024) - [i16]Niousha Nazemi, Omid Tavallaie, Anna Maria Mandalari, Hamed Haddadi, Ralph Holz, Albert Y. Zomaya:
Analysis of DNS Dependencies and their Security Implications in Australia: A Comparative Study of General and Indigenous Populations. CoRR abs/2408.12958 (2024) - [i15]Niousha Nazemi, Omid Tavallaie, Shuaijun Chen, Anna Maria Mandalari, Kanchana Thilakarathna, Ralph Holz, Hamed Haddadi, Albert Y. Zomaya:
ACCESS-FL: Agile Communication and Computation for Efficient Secure Aggregation in Stable Federated Learning Networks. CoRR abs/2409.01722 (2024) - 2023
- [j11]Patrick Sattler, Johannes Zirngibl, Mattijs Jonker, Oliver Gasser, Georg Carle, Ralph Holz:
Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns. PACMNET 1(CoNEXT3): 24:1-24:21 (2023) - [c27]Niousha Nazemi, Omid Tavallaie, Albert Y. Zomaya, Ralph Holz:
DNS Dependencies as an Expression of the Digital Divide: The Example of Australia. ESORICS Workshops (2) 2023: 496-509 - [c26]Shyam Krishna Khadka, Ralph Holz, Cristian Hesselman:
Towards Security Transparency of Autonomous Systems on the Internet. ESORICS Workshops (2) 2023: 510-513 - [c25]Sousan Tarahomi, Ralph Holz, Anna Sperotto:
Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach. NetSoft 2023: 346-349 - [c24]Ramin Yazdani, Yevheniya Nosyk, Ralph Holz, Maciej Korczynski, Mattijs Jonker, Anna Sperotto:
Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute. TMA 2023: 1-10 - [i14]Patrick Sattler, Johannes Zirngibl, Mattijs Jonker, Oliver Gasser, Georg Carle, Ralph Holz:
Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns. CoRR abs/2310.17012 (2023) - 2022
- [c23]Leandro M. Bertholdo, Sandro L. A. Ferreira, João M. Ceron, Lisandro Zambenedetti Granville, Ralph Holz, Roland van Rijswijk-Deij:
On the Asymmetry of Internet eXchange Points -Why Should IXPs and CDNs Care? CNSM 2022: 73-81 - 2020
- [j10]Ralph Holz, Jens Hiller, Johanna Amann, Abbas Razaghpanah, Thomas Jost, Narseo Vallina-Rodriguez, Oliver Hohlfeld:
Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization. Comput. Commun. Rev. 50(3): 3-15 (2020) - [j9]Ralph Holz, Marco Mellia, Olivier Bonaventure, Hamed Haddadi, Matthew Caesar, Sergey Gorinsky, Gianni Antichi, Joseph Camp, kc claffy, Bhaskaran Raman, Anna Sperotto, Aline Carneiro Viana, Steve Uhlig:
Update on ACM SIGCOMM CCR reviewing process: towards a more open review process. Comput. Commun. Rev. 50(3): 55-56 (2020) - [j8]Kwon Nung Choi, Harini Kolamunna, Akila Uyanwatta, Kanchana Thilakarathna, Suranga Seneviratne, Ralph Holz, Mahbub Hassan, Albert Y. Zomaya:
LoRadar: LoRa sensor network monitoring through passive packet sniffing. Comput. Commun. Rev. 50(4): 10-24 (2020) - [j7]Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras, Cees de Laat:
A Responsible Internet to Increase Trust in the Digital World. J. Netw. Syst. Manag. 28(4): 882-922 (2020) - [c22]Gerry Wan, Liz Izhikevich, David Adrian, Katsunari Yoshioka, Ralph Holz, Christian Rossow, Zakir Durumeric:
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. Internet Measurement Conference 2020: 662-679 - [c21]Kalana Abeywardena, Jiawei Zhao, Lexi Brent, Suranga Seneviratne, Ralph Holz:
Triplet Mining-based Phishing Webpage Detection. LCN 2020: 377-380 - [c20]Ralph Holz, Diego Perino, Matteo Varvello, Johanna Amann, Andrea Continella, Nate Evans, Ilias Leontiadis, Christopher Natoli, Quirin Scheitle:
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web. TMA 2020 - [i13]Ralph Holz, Diego Perino, Matteo Varvello, Johanna Amann, Andrea Continella, Nate Evans, Ilias Leontiadis, Christopher Natoli, Quirin Scheitle:
A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web. CoRR abs/2004.13239 (2020) - [i12]Finnegan Waugh, Ralph Holz:
An empirical study of availability and reliability properties of the Bitcoin Lightning Network. CoRR abs/2006.14358 (2020)
2010 – 2019
- 2019
- [j6]Alberto Dainotti, Ralph Holz, Mirja Kühlewind, Andra Lutu, Joel Sommers, Brian Trammell:
Open collaborative hyperpapers: a call to action. Comput. Commun. Rev. 49(1): 31-33 (2019) - [i11]Ralph Holz, Johanna Amann, Abbas Razaghpanah, Narseo Vallina-Rodriguez:
The Era of TLS 1.3: Measuring Deployment and Use with Active and Passive Methods. CoRR abs/1907.12762 (2019) - 2018
- [j5]Quirin Scheitle, Taejoong Chung, Jens Hiller, Oliver Gasser, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, Ralph Holz, David R. Choffnes, Alan Mislove, Georg Carle:
A First Look at Certification Authority Authorization (CAA). Comput. Commun. Rev. 48(2): 10-23 (2018) - [c19]Quirin Scheitle, Taejoong Chung, Johanna Amann, Oliver Gasser, Lexi Brent, Georg Carle, Ralph Holz, Jens Hiller, Johannes Naab, Roland van Rijswijk-Deij, Oliver Hohlfeld, David R. Choffnes, Alan Mislove:
Measuring Adoption of Security Additions to the HTTPS Ecosystem. ANRW 2018: 1-2 - [c18]Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch:
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Internet Measurement Conference 2018: 343-349 - [c17]Oliver Gasser, Benjamin Hof, Max Helm, Maciej Korczynski, Ralph Holz, Georg Carle:
In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements. PAM 2018: 173-185 - [i10]Lexi Brent, Anton Jurisevic, Michael Kong, Eric Liu, François Gauthier, Vincent Gramoli, Ralph Holz, Bernhard Scholz:
Vandal: A Scalable Security Analysis Framework for Smart Contracts. CoRR abs/1809.03981 (2018) - [i9]Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch:
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. CoRR abs/1809.08325 (2018) - 2017
- [c16]Jun Young Kim, Ralph Holz, Wen Hu, Sanjay Jha:
Automated Analysis of Secure Internet of Things Protocols. ACSAC 2017: 238-249 - [c15]Johanna Amann, Oliver Gasser, Quirin Scheitle, Lexi Brent, Georg Carle, Ralph Holz:
Mission accomplished?: HTTPS security after diginotar. Internet Measurement Conference 2017: 325-340 - [c14]Ingo Weber, Vincent Gramoli, Alexander Ponomarev, Mark Staples, Ralph Holz, An Binh Tran, Paul Rimba:
On Availability for Blockchain-Based Systems. SRDS 2017: 64-73 - 2016
- [j4]Johann Schlamp, Ralph Holz, Quentin Jacquemart, Georg Carle, Ernst W. Biersack:
HEAP: Reliable Assessment of BGP Hijacking Attacks. IEEE J. Sel. Areas Commun. 34(6): 1849-1861 (2016) - [c13]Dario Banfi, Olivier Mehani, Guillaume Jourjon, Lukas Schwaighofer, Ralph Holz:
Endpoint-Transparent Multipath Transport with Software-Defined Networks. LCN 2016: 307-315 - [c12]Ralph Holz, Johanna Amann, Olivier Mehani, Mohamed Ali Kâafar, Matthias Wachs:
TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication. NDSS 2016 - [i8]Luke Anderson, Ralph Holz, Alexander Ponomarev, Paul Rimba, Ingo Weber:
New kids on the block: an analysis of modern blockchains. CoRR abs/1606.06530 (2016) - [i7]Johann Schlamp, Ralph Holz, Quentin Jacquemart, Georg Carle, Ernst W. Biersack:
HEAP: Reliable Assessment of BGP Hijacking Attacks. CoRR abs/1607.00096 (2016) - [i6]Dario Banfi, Olivier Mehani, Guillaume Jourjon, Lukas Schwaighofer, Ralph Holz:
Endpoint-transparent Multipath Transport with Software-defined Networks. CoRR abs/1608.04579 (2016) - 2015
- [c11]Len Bass, Ralph Holz, Paul Rimba, An Binh Tran, Liming Zhu:
Securing a Deployment Pipeline. RELENG@ICSE 2015: 4-7 - [c10]Olivier Mehani, Ralph Holz, Simone Ferlin, Roksana Boreli:
An Early Look at Multipath TCP Deployment in the Wild. HotPlanet@MobiCom 2015: 7-12 - [c9]Johann Schlamp, Ralph Holz, Oliver Gasser, Andreas Korsten, Quentin Jacquemart, Georg Carle, Ernst W. Biersack:
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks. TMA 2015: 173-187 - [i5]Ralph Holz, Johanna Amann, Olivier Mehani, Matthias Wachs, Mohamed Ali Kâafar:
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication. CoRR abs/1511.00341 (2015) - [i4]Yaron Sheffer, Ralph Holz, Peter Saint-Andre:
Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS). RFC 7457: 1-13 (2015) - [i3]Yaron Sheffer, Ralph Holz, Peter Saint-Andre:
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). RFC 7525: 1-27 (2015) - 2014
- [b1]Ralph-Günther Holz:
Empirical analysis of Public Key Infrastructures and Investigation of Improvements. Technical University Munich, 2014, ISBN 3-937201-41-6 - [c8]Oliver Gasser, Ralph Holz, Georg Carle:
A deeper understanding of SSH: Results from Internet-wide scans. NOMS 2014: 1-9 - 2012
- [c7]Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle:
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle. ESORICS 2012: 217-234 - 2011
- [j3]Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Simon Mittelberger, Georg Carle:
On Using TPM for Secure Identities in Future Home Networks. Future Internet 3(1): 1-13 (2011) - [c6]Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle:
Investigating the OpenPGP Web of Trust. ESORICS 2011: 489-507 - [c5]Ralph Holz, Lothar Braun, Nils Kammenhuber, Georg Carle:
The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements. Internet Measurement Conference 2011: 427-444 - 2010
- [j2]Dirk Haage, Ralph Holz:
Towards Measurement Consolidation for Overlay Optimization and Service Placement. Prax. Inf.verarb. Kommun. 33(1): 12-15 (2010) - [c4]Ali Fessi, Nathan Evans, Heiko Niedermayer, Ralph Holz:
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM. IPTComm 2010: 134-145
2000 – 2009
- 2009
- [c3]Heiko Niedermayer, Ralph Holz, Marc-Oliver Pahl, Georg Carle:
On Using Home Networks and Cloud Computing for a Future Internet of Things. FIS 2009: 70-80 - [c2]Dirk Haage, Ralph Holz, Heiko Niedermayer, Pavel Laskov:
CLIO - A Cross-Layer Information Service for Overlay Network Optimization. KiVS 2009: 279-284 - 2008
- [j1]Oliver P. Waldhorst, Christian Blankenhorn, Dirk Haage, Ralph Holz, Gerald G. Koch, Boris Koldehofe, Fleming Lampi, Christoph P. Mayer, Sebastian Mies:
Spontaneous Virtual Networks: On the Road Towards the Internet's Next Generation. it Inf. Technol. 50(6): 367-375 (2008) - [c1]Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle:
Trust-Rated Authentication for Domain-Structured Distributed Systems. EuroPKI 2008: 74-88 - [i2]Marc Dacier, Ulrich Flegel, Ralph Holz, Norbert Luttenberger:
08102 Working Group -- Intrusion and Fraud Detection for Web Services. Network Attack Detection and Defense 2008 - [i1]Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage:
08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint