Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CAKE: An Efficient Group Key Management for Dynamic Groups., , , and . CoRR, (2020)A formal analysis of IKEv2's post-quantum extension., , , , and . ACSAC, page 91-105. ACM, (2021)Secure group communication in constrained networks - A gap analysis., , and . GIoTS, page 1-4. IEEE, (2017)Implicit Initialization Vector (IV) for Counter-Based Ciphers in Encapsulating Security Payload (ESP)., , and . RFC, (March 2020)Quantum-Resistant MACsec and IPsec for Virtual Private Networks., , , , , , , and . SSR, volume 13895 of Lecture Notes in Computer Science, page 1-21. Springer, (2023)Efficient Signature Verification and Key Revocation using Identity Based Cryptography.. Ludwig Maximilian University of Munich, Germany, (2020)Demonstration of quantum-digital payments., , , , , , , and . CoRR, (2023)OnCall Operator Scheduling for Satellites with Grover's Algorithm., , , , , and . ICCS (6), volume 12747 of Lecture Notes in Computer Science, page 17-29. Springer, (2021)Flachheitsbasierte Trajektorienoptimierung entlang von Wegpunkten für ein lineares Ballbot-System., , and . Automatisierungstechnik, 62 (12): 842-850 (2014)Secure group key distribution in constrained environments with IKEv2., , , and . DSC, page 384-391. IEEE, (2017)