Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A delegated authorization solution for smart-city mobile applications., , and . RTSI, page 1-6. IEEE, (2016)Blockchain Tree for eHealth., , and . CoRR, (2019)Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13 (1): 56-86 (2022)Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities., , , , , and . ARES, page 20:1-20:11. ACM, (2023)TLSAssistant Goes FINSEC A Security Platform Integration Extending Threat Intelligence Language., , , and . CPS4CIP, volume 12618 of Lecture Notes in Computer Science, page 16-30. Springer, (2020)Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation., , , and . CODASPY, page 251-256. ACM, (2021)A Modular and Extensible Framework for Securing TLS., , , and . CODASPY, page 119-124. ACM, (2022)On Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials., , , , , and . CoRR, (2024)SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes., , , , and . ARES, page 85:1-85:10. ACM, (2022)Enroll, and Authentication Will Follow - eID-Based Enrollment for a Customized, Secure, and Frictionless Authentication Experience., , and . FPS, volume 12056 of Lecture Notes in Computer Science, page 156-171. Springer, (2019)