Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

pRate: Anonymous Star Rating with Rating Secrecy., and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 550-570. Springer, (2019)Revocable Hierarchical Attribute-Based Signatures from Lattices., and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 459-479. Springer, (2022)Public Key Encryption with Distributed Keyword Search., and . INTRUST, volume 9565 of Lecture Notes in Computer Science, page 62-83. Springer, (2015)Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics., , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 263-280. Springer, (2019)Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length., and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 89-109. Springer, (2019)Password-authenticated searchable encryption., , , and . Int. J. Inf. Sec., 20 (5): 675-693 (2021)Cyber security in New Space., , , , and . Int. J. Inf. Sec., 20 (3): 287-311 (2021)TAPESTRY: A Blockchain based Service for Trusted Interaction Online., , , , , , , , , and . CoRR, (2019)Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices., , and . EuroS&P, page 928-941. IEEE, (2023)Securing Fleets of Consumer Drones at Low Cost., and . CoRR, (2019)