Personensuche
X
?
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing ,
2
From Self-Sovereign Identity to Fiduciary Identity: A Journ..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
Automated Issuance of Post-Quantum Certificates: A New Chal..:
, In:
?
Progress in Cryptology – LATINCRYPT 2023; Lecture Notes in Computer Science ,
4
Post-quantum Hybrid KEMTLS Performance in Simulated and Rea..:
, In:
?
2022 IEEE 35th International Symposium on Computer-Based Medical Systems (CBMS) ,
7
Touchless Authentication for Health Professionals: Analyzin..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
8
Redacting Blockchain Without Exposing Chameleon Hash Collis..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
10
Post-Quantum Electronic Identity: Adapting OpenID Connect a..:
, In:
?
Business Process Management Workshops; Lecture Notes in Business Information Processing ,
11
Matching Metadata on Blockchain for Self-Sovereign Identity:
, In:
?
Lecture Notes in Computer Science; Applied Cryptography and Network Security Workshops ,
15