Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving User-Auditable Pseudonym Systems., and . EuroS&P, page 269-284. IEEE, (2017)ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service.. Proc. Priv. Enhancing Technol., 2019 (3): 289-309 (2019)A Framework for Efficient Lattice-Based DAA., , , and . CYSARM@CCS, page 23-34. ACM, (2019)OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services., , , , , , , , and . GIoTS, page 1-6. IEEE, (2019)(Strong) aPAKE Revisited: Capturing Multi-User Security and Salting., and . IACR Cryptol. ePrint Arch., (2024)Group Signatures with Selective Linkability., and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 190-220. Springer, (2019)PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server., , , , and . EuroS&P, page 587-606. IEEE, (2020)Identity Management: State of the Art, Challenges and Perspectives., , , and . Privacy and Identity Management, volume 576 of IFIP Advances in Information and Communication Technology, page 45-62. Springer, (2019)Zone Encryption with Anonymous Authentication for V2V Communication., , , , and . EuroS&P, page 405-424. IEEE, (2020)Security and Privacy of Decentralized Cryptographic Contact Tracing., , , , , and . IACR Cryptol. ePrint Arch., (2020)