Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset., , , and . Proc. Priv. Enhancing Technol., 2019 (1): 172-191 (2019)Evasion Attacks and Defenses on Smart Home Physical Event Verification., , , and . NDSS, The Internet Society, (2023)Lattice-Based Public Key Searchable Encryption from Experimental Perspectives., , and . IEEE Trans. Dependable Secur. Comput., 17 (6): 1269-1282 (2020)One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices., , , and . SP, page 3026-3042. IEEE, (2023)PGPatch: Policy-Guided Logic Bug Patching for Robotic Vehicles., , , , and . SP, page 1826-1844. IEEE, (2022)Discovering IoT Physical Channel Vulnerabilities., , , , , and . CCS, page 2415-2428. ACM, (2022)Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones., and . IACR Cryptology ePrint Archive, (2017)Fast Authentication from Aggregate Signatures with Improved Security., , and . IACR Cryptology ePrint Archive, (2018)Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices., and . IEEE Trans. Serv. Comput., 15 (1): 215-227 (2022)Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT., , , and . CoRR, (2021)