Martin Grothe

According to our database1, Martin Grothe authored at least 8 papers between 2016 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Security implications through legacy software systems.
PhD thesis, 2020

2019
1 Trillion Dollar Refund: How To Spoof PDF Signatures.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
The Dangers of Key Reuse: Practical Attacks on IPsec IKE.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Breaking and Fixing Gridcoin.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2016
Computerlinguistisches Echtzeitmonitoring im Internet: Digital Listening.
Inf. Wiss. Prax., 2016

How to Break Microsoft Rights Management Services.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Breaking PPTP VPNs via RADIUS Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Your Cloud in My Company: Modern Rights Management Services Revisited.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016


  Loading...