Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Architecture for Developing Cryptographic Cloud Services., , , and . ERCIM News, (2016)CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle., , , and . ARES, page 4:1-4:9. ACM, (2018)Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications., , , and . AFRICACRYPT, volume 10831 of Lecture Notes in Computer Science, page 11-32. Springer, (2018)Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds., , and . APF, volume 9857 of Lecture Notes in Computer Science, page 115-132. Springer, (2016)An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach., , , , and . NTMS, page 1-5. IEEE, (2016)Enabling reliable and secure IoT-based smart city applications., , , , , , , and . PerCom Workshops, page 111-116. IEEE, (2014)C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality., , and . CloudCom, page 230-238. IEEE Computer Society, (2018)Protean Signature Schemes., , , and . CANS, volume 11124 of Lecture Notes in Computer Science, page 256-276. Springer, (2018)ECDSA on Things: IoT Integrity Protection in Practise., , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)Aggregation and perturbation in practice: Case-study of privacy, accuracy & performance., , , and . CAMAD, page 183-187. IEEE, (2014)