Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks., , and . VTC Spring, page 1-5. IEEE, (2015)SOFIR: Securely outsourced Forensic image recognition., , , and . ICASSP, page 2694-2698. IEEE, (2014)Distributed Searchable Symmetric Encryption., , , , , , , and . PST, page 330-337. IEEE, (2014)Oblivious Outsourced Storage with Delegation., , , , , , and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 127-140. Springer, (2011)Indicators of Malicious SSL Connections., , , and . NSS, volume 9408 of Lecture Notes in Computer Science, page 162-175. Springer, (2015)Redactable Signatures for Tree-Structured Data: Definitions and Constructions., , , , , , , , , and 1 other author(s). ACNS, volume 6123 of Lecture Notes in Computer Science, page 87-104. (2010)A Survey of Provably Secure Searchable Encryption., , , and . ACM Comput. Surv., 47 (2): 18:1-18:51 (2014)Converse PUF-Based Authentication., , , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 142-158. Springer, (2012)ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation., , , , and . SOFSEM, volume 8327 of Lecture Notes in Computer Science, page 114-125. Springer, (2014)uMine: A Blockchain Based on Human Miners., , , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 20-38. Springer, (2018)