Author of the publication

Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements.

, , , , and . Privacy and Identity Management, volume 476 of IFIP Advances in Information and Communication Technology, page 79-96. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Management of Quantum Generated Keys in IPsec., , , , , , and . SECRYPT, page 177-183. INSTICC Press, (2008)Towards a Performance Model for Byzantine Fault Tolerant (Storage) Services., , and . CoRR, (2021)PRISMACLOUD - Privacy and Security Maintaining Services in the Cloud., , and . ERCIM News, (2016)Towards a Performance Model for Byzantine Fault Tolerant Services., , and . CLOSER, page 178-189. SCITEPRESS, (2022)Malicious Clients in Distributed Secret Sharing Based Storage Networks., , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 206-214. Springer, (2016)The Archistar Secret-Sharing Backup Proxy., , and . ARES, page 88:1-88:8. ACM, (2017)Outsourced Computations Maintaining Confidentiality and Authenticity., , , and . ERCIM News, (2023)Passive ROADM Flexibility in Optical Access With Spectral and Spatial Reconfigurability., , , , , , , , and . IEEE J. Sel. Areas Commun., 33 (12): 2837-2846 (2015)A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management., , and . CCSW, page 41-51. ACM, (2022)A fast and resource efficient FPGA implementation of secret sharing for storage applications., , and . DATE, page 654-659. IEEE, (2018)