Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic parsing of X.509: Eradicating security issues with a parse tree., , and . Journal of Computer Security, 26 (6): 817-849 (2018)Automated instantiation of side-channel attacks countermeasures for software cipher implementations., , and . Conf. Computing Frontiers, page 455-460. ACM, (2016)Distributed Shuffling for Preserving Access Confidentiality., , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 628-645. Springer, (2013)Securing software cryptographic primitives for embedded systems against side channel attacks., , and . ICCST, page 1-6. IEEE, (2014)Access Privacy in the Cloud., , , , and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 186-205. Springer, (2018)A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications., , , , and . IACR Cryptology ePrint Archive, (2019)Selective Exchange of Confidential Data in the Outsourcing Scenario., , , , and . Privacy and Identity Management for Life, Springer, (2011)Supporting concurrency and multiple indexes in private access to outsourced data., , , , and . Journal of Computer Security, 21 (3): 425-461 (2013)Access Control for the Shuffle Index., , , , and . DBSec, volume 9766 of Lecture Notes in Computer Science, page 130-147. Springer, (2016)Secure Index.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)