Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards., , , and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 286-298. Springer, (2019)Privacy-Enhanced Data Collection Scheme for Smart-Metering., , and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 413-429. Springer, (2015)Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs., , and . WPES@CCS, page 123-133. ACM, (2016)Hardware-Accelerated Twofish Core for FPGA., , and . TSP, page 1-5. IEEE, (2018)Multi-Device Authentication using Wearables and IoT., , and . SECRYPT, page 483-488. SciTePress, (2016)Security and privacy in the smart grid services., , , and . TSP, page 71-75. IEEE, (2015)Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration., , and . SECRYPT, page 555-560. SciTePress, (2013)Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment., , , and . SECRYPT, page 349-354. SciTePress, (2015)Secure Physical Access Control with Strong Cryptographic Protection., , and . SECRYPT, page 220-227. SciTePress, (2015)Anonymous Authentication with Spread Revelation., and . Cryptologia, 35 (3): 235-246 (2011)