Search Results - "Vogel, Niklas"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    RPKI: Not Perfect But Good Enough by Schulmann, Haya, Vogel, Niklas, Waidner, Michael

    Published 22-09-2024
    “…The Resource Public Key Infrastructure (RPKI) protocol was standardized to add cryptographic security to Internet routing. With over 50% of Internet resources…”
    Get full text
    Journal Article
  6. 6

    The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC by Heftrig, Elias, Schulmann, Haya, Vogel, Niklas, Waidner, Michael

    Published 05-06-2024
    “…Availability is a major concern in the design of DNSSEC. To ensure availability, DNSSEC follows Postel's Law [RFC1123]: "Be liberal in what you accept, and…”
    Get full text
    Journal Article
  7. 7

    The CURE To Vulnerabilities in RPKI Validation by Mirdita, Donika, Schulmann, Haya, Vogel, Niklas, Waidner, Michael

    Published 04-12-2023
    “…Over recent years, the Resource Public Key Infrastructure (RPKI) has seen increasing adoption, with now 37.8% of the major networks filtering bogus BGP routes…”
    Get full text
    Journal Article
  8. 8

    Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet by Hlavacek, Tomas, Shulman, Haya, Vogel, Niklas, Waidner, Michael

    Published 21-03-2023
    “…IP prefix hijacks allow adversaries to redirect and intercept traffic, posing a threat to the stability and security of the Internet. To prevent prefix…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Recommendations of nursing students to improve nursing curriculum in Germany: Current results of a study with mixed methods design by Panjaitan, Hentry, Kowe, Antonia, Vogel, Jann Niklas, Wachholz, Anne, Teipel, Stefan J

    Published in Alzheimer's & dementia (01-12-2021)
    “…Background Digitalization is key to face socio‐demographic change accompanied by an increasing care demand of people with dementia and a shortage of skilled…”
    Get full text
    Journal Article
  11. 11

    Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU by Gruza, Olivia, Heftrig, Elias, Jacobsen, Oliver, Schulmann, Haya, Vogel, Niklas, Waidner, Michael

    Published 22-03-2024
    “…NSEC3 is a proof of non-existence in DNSSEC, which provides an authenticated assertion that a queried resource does not exist in the target domain. NSEC3…”
    Get full text
    Journal Article
  12. 12
  13. 13

    Pflege Kolleg 21_Pflegephänomene by Heinze, Cornelia, Vogel, Jann Niklas, Schmidt, Stefan

    “…Sturzrisikofaktoren (alphabetisch geordnet) Personenbezogene Risikofaktoren Beeinträchtigte funktionelle Fähigkeiten* (z.B. Einschränkungen in den Aktivitäten…”
    Get full text
    Journal Article