Author of the publication

A General Framework for Redactable Signatures and New Constructions.

, , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 3-19. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds., , and . APF, volume 9857 of Lecture Notes in Computer Science, page 115-132. Springer, (2016)An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach., , , , and . NTMS, page 1-5. IEEE, (2016)A New Architecture for Developing Cryptographic Cloud Services., , , and . ERCIM News, (2016)Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures. Passau University, Germany, (2018)base-search.net (ftunivpassau:oai:kobv.de-opus4-uni-passau:582).Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications., , and . GIoTS, page 1-6. IEEE, (2020)CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle., , , and . ARES, page 4:1-4:9. ACM, (2018)Fully Invisible Protean Signatures Schemes., , , and . IACR Cryptology ePrint Archive, (2019)Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT., , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 197-213. Springer, (2016)Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security., , and . ADIoT, volume 13745 of Lecture Notes in Computer Science, page 143-164. Springer, (2022)Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions., , , and . ICETE (Selected Papers), volume 455 of Communications in Computer and Information Science, page 155-171. Springer, (2012)