Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Maturity Model for Crypto-Agility Assessment., , and . FPS, volume 13877 of Lecture Notes in Computer Science, page 104-119. Springer, (2022)QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging., , , , , and . ACNS, volume 13906 of Lecture Notes in Computer Science, page 85-111. Springer, (2023)On the design and implementation of the Open eCard App., , , , , , , , , and 5 other author(s). Sicherheit, volume P-195 of LNI, page 95-110. GI, (2012)Long term confidentiality: a survey., , , and . Des. Codes Cryptogr., 71 (3): 459-478 (2014)IoT Stream Processing Tutorial, , and . Big Stream Processing Systems (Dagstuhl Seminar 17441), volume 7 of Dagstuhl Seminar, chapter Overview of Talks, Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, (2018)SoK: Post-Quantum TLS Handshake., , , and . IACR Cryptol. ePrint Arch., (2023)A Review of existing GDPR Solutions for Citizens and SMEs., , and . CoRR, (2023)On PQC Migration and Crypto-Agility., , , , , , and . CoRR, (2021)On the State of Post-Quantum Cryptography Migration., , , , , , and . GI-Jahrestagung, volume P-314 of LNI, page 907-941. Gesellschaft für Informatik, Bonn, (2021)On Message-based Consensus and Network Coding., , , and . NoF, page 1-9. IEEE, (2021)