Author of the publication

Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device.

, , , , , and . WoWMoM, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach., , , , and . NTMS, page 1-5. IEEE, (2016)Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds., , and . APF, volume 9857 of Lecture Notes in Computer Science, page 115-132. Springer, (2016)Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures. Passau University, Germany, (2018)base-search.net (ftunivpassau:oai:kobv.de-opus4-uni-passau:582).CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle., , , and . ARES, page 4:1-4:9. ACM, (2018)Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications., , and . GIoTS, page 1-6. IEEE, (2020)MQfilTTr: Strengthening Smart Home Privacy Through MQTT Traffic Manipulation., , , , and . WISTP, volume 14625 of Lecture Notes in Computer Science, page 17-32. Springer, (2024)Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security., , and . ADIoT, volume 13745 of Lecture Notes in Computer Science, page 143-164. Springer, (2022)Fully Invisible Protean Signatures Schemes., , , and . IACR Cryptology ePrint Archive, (2019)Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT., , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 197-213. Springer, (2016)Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions., , , and . ICETE (Selected Papers), volume 455 of Communications in Computer and Information Science, page 155-171. Springer, (2012)