Search

Your search keyword '"Henrich C. Pöhls"' showing total 31 results

Search Constraints

Start Over You searched for: Author "Henrich C. Pöhls" Remove constraint Author: "Henrich C. Pöhls" Topic 0202 electrical engineering, electronic engineering, information engineering Remove constraint Topic: 0202 electrical engineering, electronic engineering, information engineering
31 results on '"Henrich C. Pöhls"'

Search Results

1. Fully invisible protean signatures schemes

2. Dynamic Consent: Physical Switches and Feedback to Adjust Consent to IoT Data Collection

3. C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality

4. Towards GDPR-compliant data processing in modern SIEM systems

5. The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication

6. Protean Signature Schemes

7. Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

8. CryptSDLC - Embedding Cryptographic Engineering into Secure Software Development Lifecycle

9. Position Paper

10. Towards compactly encoded signed IoT messages

11. Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

12. Chameleon-Hashes with Ephemeral Trapdoors

13. A Privacy Engineering Framework for the Internet of Things

14. Designing Secure IoT Architectures for Smart City Applications

15. Security and Privacy for the Internet of Things Communication in the SmartCity

16. An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach

17. PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services

18. Cryptographically Enforced Four-Eyes Principle

19. Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device

20. Towards Authenticity and Privacy Preserving Accountable Workflows

21. ECDSA on Things: IoT Integrity Protection in Practise

22. Malleable Signatures for Resource Constrained Platforms

23. Non-interactive Public Accountability for Sanitizable Signatures

24. What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net

25. Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds

26. Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications

27. Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT

28. Accountable Redactable Signatures

29. A General Framework for Redactable Signatures and New Constructions

30. On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems

31. Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications

Catalog

Books, media, physical & digital resources