Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices., and . J. Univers. Comput. Sci., 16 (9): 1139-1151 (2010)Group Signatures on Mobile Devices: Practical Experiences., , , , , and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 47-64. Springer, (2013)A PrivacyCA for Anonymity and Trust., , , and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 101-119. Springer, (2009)Secure Multi-Agent System for Multi-Hop Environments., , and . MMM-ACNS, volume 6258 of Lecture Notes in Computer Science, page 270-283. Springer, (2010)Secure Block Device - Secure, Flexible, and Efficient Data Storage for ARM TrustZone Systems., , and . TrustCom/BigDataSE/ISPA (1), page 222-229. IEEE, (2015)Attacking ECDSA-Enabled RFID Devices., , , and . ACNS, volume 5536 of Lecture Notes in Computer Science, page 519-534. (2009)ECC Is Ready for RFID - A Proof in Silicon., , and . Selected Areas in Cryptography, volume 5381 of Lecture Notes in Computer Science, page 401-413. Springer, (2008)Do you think your passwords are secure?, , , , and . PRISMS, page 1-8. IEEE, (2014)Security concepts for a distributed architecture for activity logging and analysis., , , , , , and . I-KNOW, page 23:1-23:6. ACM, (2014)Securing smart maintenance services: Hardware-security and TLS for MQTT., , , , , , , , and . INDIN, page 1243-1250. IEEE, (2015)