Automated verification of accountability in security protocols R Künnemann, I Esiyok, M Backes 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 397-39716, 2019 | 35 | 2019 |
Automated security analysis of exposure notification systems K Morio, I Esiyok, D Jackson, R Künnemann 32nd USENIX Security Symposium (USENIX Security 23), 6593-6610, 2023 | 5 | 2023 |
Accountable Javascript Code Delivery I Esiyok, P Berrang, K Cohn-Gordon, R Kuennemann Network and Distributed System Security 2023 (ISBN 1-891562-83-5), 2023 | 2 | 2023 |
TrollThrottle—Raising the Cost of Astroturfing I Esiyok, L Hanzlik, R Künnemann, LM Budde, M Backes Applied Cryptography and Network Security: 18th International Conference …, 2020 | 2 | 2020 |
Three modest proposals for building trust: in social media discourse, the software that powers it and the browsers that run the software I Esiyok Saarländische Universitäts-und Landesbibliothek, 2023 | | 2023 |