Author of the publication

Search, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes.

, , , and . IoTBDS, page 414-421. SciTePress, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dealing with Complexity for Immune-Inspired Anomaly Detection in Cyber Physical Systems., , , and . SKM, volume 1549 of Communications in Computer and Information Science, page 151-170. Springer, (2021)Papers, Please... - X.509 Certificate Revocation in Practice., and . DCNET, page 36-40. SciTePress, (2014)Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks., , , , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 349-365. Springer, (2008)What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite Compatibility., , , , , and . ICETE (Selected Papers), volume 585 of Communications in Computer and Information Science, page 58-78. Springer, (2015)The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA., , and . ICETE (Selected Papers), volume 222 of Communications in Computer and Information Science, page 71-83. Springer, (2010)Token-based Authentication for Smartphones., , , and . DCNET/ICE-B/OPTICS, page 51-56. SciTePress, (2013)Secure Key Management in Embedded Systems: A First Proposal., , and . IoTBDS, page 81-91. SCITEPRESS, (2021)Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller., , , , , , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 430-444. Springer, (2006)Smart Elliptic Curve Cryptography for Smart Dust., , , , and . QSHINE, volume 74 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 623-634. Springer, (2010)Search, Find and Resolve: Towards a Taxonomy for Searchable Encryption Schemes., , , and . IoTBDS, page 414-421. SciTePress, (2019)