Author of the publication

Towards Provably Secure Group Key Agreement Building on Group Theory.

, , and . IACR Cryptology ePrint Archive, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains., , , , and . IACR Cryptology ePrint Archive, (2018)Secure Group Key Establishment Revisited., , and . IACR Cryptol. ePrint Arch., (2005)A Comparison of Payment Schemes for the IoT., , , and . Open Identity Summit, volume P-277 of LNI, page 181-186. GI, (2017)RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT., , , and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 440-448. IEEE, (2016)Dependable Over-the-Air Programming., , , , and . Ad Hoc & Sensor Wireless Networks, 13 (3-4): 313-340 (2011)Selective decryption of outsourced IoT data., , and . WF-IoT, page 739-744. (2015)Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen)., , , and . it - Information Technology, 52 (6): 313-319 (2010)A secure and resilient WSN roadside architecture for intelligent transport systems., , , and . WISEC, page 161-171. ACM, (2008)FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks., , and . WISEC, page 253-260. ACM, (2009)Key substitution attacks revisited: Taking into account malicious signers., , and . Int. J. Inf. Sec., 5 (1): 30-36 (2006)