Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transparent Probabilistic Packet Marking., , , and . J. Inf. Process., 22 (4): 609-616 (2014)Chronological Analysis of Source Code Reuse Impact on Android Application Security., and . J. Inf. Process., (2019)Editor's Message to Special Issue of Usable Security.. J. Inf. Process., (2020)Vision: How to Provide Documentation to Non-skilled Developers for Appropriate Use of Cryptography: Action Research Study on Expert Monitoring., and . EuroUSEC, page 218-223. ACM, (2023)32-bit as Number Based IP Traceback., , , and . IMIS, page 628-633. IEEE Computer Society, (2011)Multivariate Statistical Analysis of Network Traffic for Intrusion Detection., and . DEXA Workshops, page 472-476. IEEE Computer Society, (2003)Toward Practical Searchable Symmetric Encryption., , , and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 151-167. Springer, (2013)FPGA and ASIC implementations of the etaT pairing in characteristic three., , , , , , , , , and 6 other author(s). Comput. Electr. Eng., 36 (1): 73-87 (2010)Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)., , , and . Int. J. Inf. Sec., 19 (1): 15-38 (2020)Helping Johnny to Search: Usable Encrypted Search on Webmail System., , and . J. Inf. Process., (2019)