Author of the publication

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.

, , , , , , , , , , and . Privacy and Identity Management, volume 526 of IFIP Advances in Information and Communication Technology, page 153-169. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks., and . IJBIDM, 3 (3): 236-254 (2008)Fully-Anonymous Short Dynamic Group Signatures Without Encryption., and . IACR Cryptology ePrint Archive, (2016)Key-Homomorphic Signatures and Applications to Multiparty Signatures., and . IACR Cryptology ePrint Archive, (2016)Fully Invisible Protean Signatures Schemes., , , and . IACR Cryptology ePrint Archive, (2019)Cloud Security and Privacy by Design., , and . e-Democracy, volume 570 of Communications in Computer and Information Science, page 202-206. Springer, (2015)On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud., and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 300-314. Springer, (2013)Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources.. Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 73-91. Springer, (2011)Electronic Health Records: An Enhanced Security Paradigm to Preserve Patient's Privacy., and . BIOSTEC (Selected Papers), volume 52 of Communications in Computer and Information Science, page 369-380. (2009)Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract).. Communications and Multimedia Security, volume 7025 of Lecture Notes in Computer Science, page 247-249. Springer, (2011)Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications., , , , , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 219-250. Springer, (2018)