Roland van Rijswijk-Deij
Roland van Rijswijk-Deij
Professor of Network Security, University of Twente
Verified email at - Homepage
Cited by
Cited by
Booters-An analysis of DDoS-as-a-Service Attacks
JJ Santanna, R van Rijswijk-Deij, A Sperotto, R Hofstede, M Wierbosch, ...
Proceedings of the 14th IFIP/IEEE Symposium on Integrated Network and …, 2014
DNSSEC and its potential for DDoS attacks - a comprehensive measurement study
R van Rijswijk-Deij, A Sperotto, A Pras
Proceedings of the 2014 ACM Internet Measurement Conference (IMC 2014), 449-460, 2014
A high-performance, scalable infrastructure for large-scale active DNS measurements
R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras
IEEE Journal on Selected Areas in Communications 34 (6), 1877-1888, 2016
A Longitudinal, End-to-End View of the {DNSSEC} Ecosystem
T Chung, R van Rijswijk-Deij, B Chandrasekaran, D Choffnes, D Levin, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1307-1322, 2017
Measuring the adoption of DDoS protection services
M Jonker, A Sperotto, R van Rijswijk-Deij, R Sadre, A Pras
Proceedings of the 2016 Internet Measurement Conference, 279-285, 2016
A first look at certification authority authorization (caa)
Q Scheitle, T Chung, J Hiller, O Gasser, J Naab, R van Rijswijk-Deij, ...
ACM SIGCOMM Computer Communication Review 48 (2), 10-23, 2018
Understanding the role of registrars in DNSSEC deployment
T Chung, R van Rijswijk-Deij, D Choffnes, D Levin, BM Maggs, A Mislove, ...
Proceedings of the 2017 Internet Measurement Conference, 369-383, 2017
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches
R van Rijswijk-Deij, E Poll
Open Identity Summit 2013, OID 2013, 20-31, 2013
Making the case for elliptic curves in DNSSEC
R van Rijswijk-Deij, A Sperotto, A Pras
ACM SIGCOMM computer communication review 45 (5), 13-19, 2015
DNSSEC meets real world: dealing with unreachability caused by fragmentation
G van den Broek, R van Rijswijk, A Pras, A Sperotto
IEEE Communications Magazine 52 (4), 154-160, 2014
The performance impact of elliptic curve cryptography on DNSSEC validation
R van Rijswijk-Deij, K Hageman, A Sperotto, A Pras
IEEE/ACM transactions on networking 25 (2), 738-750, 2016
RPKI is coming of age: a longitudinal study of RPKI deployment and invalid route origins
T Chung, E Aben, T Bruijnzeels, B Chandrasekaran, D Choffnes, D Levin, ...
Proceedings of the Internet Measurement Conference, 406-419, 2019
Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers
A Abhishta, R van Rijswijk-Deij, LJM Nieuwenhuis
ACM SIGCOMM Computer Communication Review 48 (5), 70-76, 2019
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC
R van Rijswijk-Deij, M Jonker, A Sperotto
2016 12th International Conference on Network and Service Management (CNSM …, 2016
The Internet of names: A DNS big dataset
R van Rijswijk-Deij, M Jonker, A Sperotto, A Pras
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
Ethics in data sharing: developing a model for best practice
S Dietrich, J Van Der Ham, A Pras, R van Rijswijk Deij, D Shou, ...
2014 IEEE Security and Privacy Workshops, 5-9, 2014
Tiqr: A Novel Take on Two-Factor Authentication.
RM Van Rijswijk, J Van Dijk
USENIX LISA 2011, 2011
Passive observations of a large DNS service: 2.5 years in the life of Google
WB De Vries, R van Rijswijk-Deij, PT de Boer, A Pras
IEEE transactions on network and service management 17 (1), 190-200, 2019
Improving DNS security: a measurement-based approach
R van Rijswijk-Deij
On the potential of IPv6 open resolvers for DDoS attacks
L Hendriks, R de Oliveira Schmidt, R van Rijswijk-Deij, A Pras
International Conference on Passive and Active Network Measurement, 17-29, 2017
The system can't perform the operation now. Try again later.
Articles 1–20