Author of the publication

HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data.

, , , and . IACR Cryptol. ePrint Arch., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ProPoS: A Probabilistic Proof-of-Stake Protocol., , , , and . CoRR, (2020)Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults., , and . CoRR, (2020)SCARR: A Novel Scalable Runtime Remote Attestation., , , , and . CoRR, (2018)File Guard: automatic format-based media file sanitization - A black-box approach against vulnerability exploitation., , , and . Int. J. Inf. Sec., 18 (6): 701-713 (2019)Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext., and . Int. J. Inf. Sec., 20 (2): 141-159 (2021)VitroBench: Manipulating in-vehicle networks and COTS ECUs on your bench: A comprehensive test platform for automotive cybersecurity research., , , and . Veh. Commun., (October 2023)Non-Intrusive Protection for Legacy SCADA Systems., and . IEEE Commun. Mag., 61 (6): 36-42 (June 2023)Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage., , , , and . IEEE Trans. Cloud Comput., 9 (1): 212-225 (2021)Towards Semantic Sensitive Feature Profiling of IoT Devices., , and . IEEE Internet Things J., 6 (5): 8056-8064 (2019)Post-Quantum Adversarial Modeling: A User's Perspective., , , and . Computer, 56 (8): 58-67 (August 2023)