Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparison of Payment Schemes for the IoT., , , and . Open Identity Summit, volume P-277 of LNI, page 181-186. GI, (2017)PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains., , , , and . IACR Cryptology ePrint Archive, (2018)Secure Group Key Establishment Revisited., , and . IACR Cryptol. ePrint Arch., (2005)Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen)., , , and . it - Information Technology, 52 (6): 313-319 (2010)Selective decryption of outsourced IoT data., , and . WF-IoT, page 739-744. (2015)Dependable Over-the-Air Programming., , , , and . Ad Hoc & Sensor Wireless Networks, 13 (3-4): 313-340 (2011)Key substitution attacks revisited: Taking into account malicious signers., , and . Int. J. Inf. Sec., 5 (1): 30-36 (2006)RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT., , , and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 440-448. IEEE, (2016)A secure and resilient WSN roadside architecture for intelligent transport systems., , , and . WISEC, page 161-171. ACM, (2008)FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks., , and . WISEC, page 253-260. ACM, (2009)