Personensuche
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
2
Machine-Checked Proofs of Accountability: How to sElect Who..:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
3
Machine-Checked Proofs of Privacy Against Malicious Boards ..:
, In:
?
2021 IEEE 34th Computer Security Foundations Symposium (CSF) ,
5
Mechanised Models and Proofs for Distance-Bounding:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
7
Biometric-Authenticated Searchable Encryption:
, In:
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
8
KYChain : user-controlled KYC data sharing and certifica..:
, In:
?
Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology ,
11
Bootstrapping Online Trust: Timeline Activity Proofs:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
15