Author of the publication

Privacy-Aware Authentication in the Internet of Things.

, , , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 32-39. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Signatures from Symmetric-Key Primitives., , , , and . IACR Cryptology ePrint Archive, (2016)Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions., , , and . IACR Cryptol. ePrint Arch., (2020)Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper).. Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, page 215-222. Springer, (2012)Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials., and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 491-511. Springer, (2014)The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality., and . J. Inf. Secur. Appl., (2016)A New Architecture for Developing Cryptographic Cloud Services., , , and . ERCIM News, (2016)Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge., and . Des. Codes Cryptogr., 87 (6): 1373-1413 (2019)RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy., , , and . ARES, page 123:1-123:9. ACM, (2023)Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives., , , , , , , and . CCS, page 1825-1842. ACM, (2017)Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange., , , , and . IACR Cryptol. ePrint Arch., (2018)