Bohli, Jens-Matthias
35  Ergebnisse:
Personensuche X
?
 
?
2

Outsourcing Proofs of Retrievability:

Armknecht, Frederik ; Bohli, Jens-Matthias ; Karame, Ghassan.
IEEE Transactions on Cloud Computing.  9 (2021)  1 - p. 286-301 , 2021
 
?
3

Regulating Storage Overhead in Existing PoW-based Blockchai..:

, In: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies,
 
?
5

Password–Authenticated Group Key Establishment from Smooth ..:

Bohli, Jens-Matthias ; González Vasco, María Isabel ; Steinwandt, Rainer
International Journal of Applied Mathematics and Computer Science.  29 (2019)  4 - p. 797-815 , 2019
 
?
6

Sharing Proofs of Retrievability across Tenants:

, In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security,
 
?
7

Transparent Data Deduplication in the Cloud:

, In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
 
?
9

Outsourced Proofs of Retrievability:

, In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,
 
?
10

Relations among privacy notions:

Bohli, Jens-Matthias ; Pashalidis, Andreas
ACM Transactions on Information and System Security.  14 (2011)  1 - p. 1-24 , 2011
 
?
11

Relations among privacy notions:

Bohli, Jens-Matthias ; Pashalidis, Andreas
ACM Transactions on Information and System Security (TISSEC).  14 (2011)  1 - p. 1-24 , 2011
 
?
12

Initial observations on economics, pricing, and penetration..:

Bohli, Jens-Matthias ; Sorge, Christoph ; Westhoff, Dirk
ACM SIGCOMM Computer Communication Review.  39 (2009)  2 - p. 50-55 , 2009
 
?
13

A ROM-friendly secure code update mechanism for WSNs using ..:

, In: Proceedings of the second ACM conference on Wireless network security,
 
?
14

FAIR : fuzzy-based aggregation providing in-network resi..:

, In: Proceedings of the second ACM conference on Wireless network security,
 
?
15

Initial observations on economics, pricing, and penetration..:

Bohli, Jens-Matthias ; Sorge, Christoph ; Westhoff, Dirk
ACM SIGCOMM Computer Communication Review.  39 (2009)  2 - p. 50-55 , 2009
 
1-15