Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malicious Clients in Distributed Secret Sharing Based Storage Networks., , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 206-214. Springer, (2016)Towards the Adoption of Secure Cloud Identity Services., , , , , , , and . ARES, page 90:1-90:7. ACM, (2017)Practical Group-Signatures with Privacy-Friendly Openings., , and . ARES, page 10:1-10:10. ACM, (2019)Bringing Zero-Knowledge Proofs of Knowledge to Practice.. Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 63-68. Springer, (2009)Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing., , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 211-227. (2016)Towards Privacy in Geographic Message Dissemination for Connected Vehicles., and . CoRR, (2020)Bringing zero-knowledge proofs of knowledge to practice.. University of Fribourg, (2012)Single-Use Delegatable Signatures Based on Smart Contracts., and . ARES, page 40:1-40:7. ACM, (2021)Breaking and Fixing Anonymous Credentials for the Cloud., and . CANS, volume 11829 of Lecture Notes in Computer Science, page 249-269. Springer, (2019)CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing., , , , and . ARES, page 742-749. IEEE Computer Society, (2016)