Understanding the mirai botnet M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ... 26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017 | 1539 | 2017 |
The Security Impact of HTTPS Interception. Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ... NDSS, 2017 | 160 | 2017 |
Adaptive secondary authentication criteria based on account data JG Mclachlan, AJ Farrugia, NT Sullivan US Patent 9,043,887, 2015 | 120 | 2015 |
Secure session capability using public-key cryptography without access to the private key SAH Pahl, MPF Tourne, P Sikora, RR Bejjani, DO Knecht, MB Prince, ... US Patent 9,184,911, 2015 | 78 | 2015 |
Transparent DNSSEC-signing proxy NT Sullivan, O Gudmundsson, F Valsorda US Patent 10,033,699, 2018 | 53 | 2018 |
Encrypted server name indication for TLS 1.3 E Rescorla, K Oku, N Sullivan, CA Wood IETF draft. Available at: https://tools. ietf. org/html/draft-ietf-tls-esni …, 2019 | 46 | 2019 |
RPKI is coming of age: A longitudinal study of RPKI deployment and invalid route origins T Chung, E Aben, T Bruijnzeels, B Chandrasekaran, D Choffnes, D Levin, ... Proceedings of the Internet Measurement Conference, 406-419, 2019 | 42 | 2019 |
Privacy Pass: Bypassing Internet Challenges Anonymously. A Davidson, I Goldberg, N Sullivan, G Tankersley, F Valsorda Proc. Priv. Enhancing Technol. 2018 (3), 164-180, 2018 | 41 | 2018 |
A (relatively easy to understand) primer on elliptic curve cryptography N Sullivan Ars Technica, 2013 | 39* | 2013 |
Protocols for checking compromised credentials L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 37 | 2019 |
403 forbidden: A global view of cdn geoblocking A McDonald, M Bernhard, L Valenta, B VanderSloot, W Scott, N Sullivan, ... Proceedings of the Internet Measurement Conference 2018, 218-230, 2018 | 35 | 2018 |
Is the Web ready for OCSP must-staple? T Chung, J Lok, B Chandrasekaran, D Choffnes, D Levin, BM Maggs, ... Proceedings of the Internet Measurement Conference 2018, 105-118, 2018 | 33 | 2018 |
An analysis of TLS handshake proxying D Stebila, N Sullivan 2015 IEEE Trustcom/BigDataSE/ISPA 1, 279-286, 2015 | 26 | 2015 |
In search of CurveSwap: Measuring elliptic curve implementations in the wild L Valenta, N Sullivan, A Sanso, N Heninger 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 384-398, 2018 | 25 | 2018 |
Hashing to elliptic curves A Faz-Hernandez, S Scott, N Sullivan, RS Wahby, CA Wood Internet Research Task Force, Informational, 2021 | 24 | 2021 |
TLS encrypted client hello E Rescorla, K Oku, N Sullivan, CA Wood IETF Draft, 2020 | 24 | 2020 |
Keyless SSL: The nitty gritty technical details N Sullivan CloudFlare blog, 2014 | 15 | 2014 |
ECDSA: The digital signature algorithm of a better internet N Sullivan online] https://blog. cloudflare. com/ecdsa-the-digital-signature-algorithm …, 2014 | 15 | 2014 |
Secure account creation T Alsina, MK Chu, AJ Farrugia, G Fasoli, SB Kelly, DJ Rojas, NT Sullivan, ... US Patent 8,949,935, 2015 | 14 | 2015 |
Delegated credentials for TLS R Barnes, S Iyengar, N Sullivan, E Rescorla Internet Engineering Task Force, Internet-Draft draft-draft-ietf-tls-subcerts, 2020 | 13 | 2020 |