Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Architecture for Developing Cryptographic Cloud Services., , , and . ERCIM News, (2016)CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle., , , and . ARES, page 4:1-4:9. ACM, (2018)An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach., , , , and . NTMS, page 1-5. IEEE, (2016)Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications., , , and . AFRICACRYPT, volume 10831 of Lecture Notes in Computer Science, page 11-32. Springer, (2018)Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds., , and . APF, volume 9857 of Lecture Notes in Computer Science, page 115-132. Springer, (2016)What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net., , and . J. Reliable Intelligent Environments, 5 (1): 41-64 (2019)Towards a New Paradigm for Privacy and Security in Cloud Services., , , , , , , , , and . CSP Forum, volume 530 of Communications in Computer and Information Science, page 14-25. Springer, (2015)Enabling reliable and secure IoT-based smart city applications., , , , , , , and . PerCom Workshops, page 111-116. IEEE, (2014)C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality., , and . CloudCom, page 230-238. IEEE Computer Society, (2018)Protean Signature Schemes., , , and . CANS, volume 11124 of Lecture Notes in Computer Science, page 256-276. Springer, (2018)