Author of the publication

PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET).

, , and . VNC, page 25-32. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Architecture for Accessing Health Records on Mobile Phones., , , , and . HEALTHINF, page 87-96. SciTePress, (2011)An Evaluation of Pseudonym Changes for Vehicular Networks in Large-Scale, Realistic Traffic Scenarios., , , , and . IEEE Trans. Intelligent Transportation Systems, 19 (10): 3400-3405 (2018)Securing the Access to Electronic Health Records on Mobile Phones., , , , and . BIOSTEC (Selected Papers), volume 273 of Communications in Computer and Information Science, page 365-379. Springer, (2011)Trusted virtual domains: Color your network., , , , , and . Datenschutz und Datensicherheit, 34 (5): 289-294 (2010)A trusted versioning file system for passive mobile storage devices., , , and . J. Network and Computer Applications, (2014)A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting., , , , and . Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, page 29-44. Springer, (2007)Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly., , , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 29-44. Springer, (2008)Trusted virtual domains on OpenSolaris: usable secure desktop environments., , , , and . STC@CCS, page 91-96. ACM, (2010)TruWallet: trustworthy and migratable wallet-based web authentication., , , and . STC, page 19-28. ACM, (2009)Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices., , , , , and . IACR Cryptology ePrint Archive, (2011)