Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPATE: small-group PKI-less authenticated trust establishment., , , , , , , , , and . MobiSys, page 1-14. ACM, (2009)Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles., , , and . WISEC, page 51-56. ACM, (2014)oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks., , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 651-663 (2012)A Pair-wise Key Establishment for Wireless Sensor Networks., , , and . IIH-MSP, page 1152-1155. IEEE Computer Society, (2009)COCA: Computation Offload to Clouds Using AOP., , and . CCGRID, page 466-473. IEEE Computer Society, (2012)SafeSlinger: easy-to-use and secure public-key exchange., , , , and . MobiCom, page 417-428. ACM, (2013)YourPassword: applying feedback loops to improve security behavior of managing multiple passwords., , , , , , and . AsiaCCS, page 513-518. ACM, (2014)DepenDNS: Dependable Mechanism against DNS Cache Poisoning., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 174-188. Springer, (2009)KISS: "Key It Simple and Secure" Corporate Key Management., , , , and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 1-18. Springer, (2013)An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks., , , and . ICESS, page 19-26. IEEE Computer Society, (2008)