Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dispute Resolution for Smart Contract-based Two-Party Protocols., , , , and . IEEE ICBC, page 422-430. IEEE, (2019)Secure and anonymous decentralized Bitcoin mixing., , , , and . Future Generation Comp. Syst., (2018)Privacy-Preserving Remote Knowledge System., , , , , and . ICNP, page 1-2. IEEE, (2019)Practical Data Compliance for Cloud Storage., , , , , , and . IC2E, page 252-258. IEEE Computer Society, (2017)myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data., , , , , , , , , and 2 other author(s). GI-Jahrestagung, volume P-275 of LNI, page 1073-1084. GI, (2017)A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin., , , , , , and . Financial Cryptography, volume 10957 of Lecture Notes in Computer Science, page 420-438. Springer, (2018)A Trust Point-based Security Architecture for Sensor Data in the Cloud., , , and . Trusted Cloud Computing, Springer, (2014)The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud., , , and . CoRR, (2016)POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store., , , , , and . ACM Conference on Computer and Communications Security, page 1769-1771. ACM, (2016)Thwarting Unwanted Blockchain Content Insertion., , , , and . IC2E, page 364-370. IEEE Computer Society, (2018)