Personensuche
X
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
1
A Source Hiding Protocol for Cooperative Intelligent Transp..:
, In:
?
2023 49th Euromicro Conference on Software Engineering and Advanced Applications (SEAA) ,
3
Thrifty Guardians: Overcoming the Challenges of Establishin..:
, In:
?
Lecture Notes in Computer Science; Risks and Security of Internet and Systems ,
4
Pseudonym Swapping with Secure Accumulators and Double Diff..:
, In:
?
Product-Focused Software Process Improvement; Lecture Notes in Computer Science ,
5
A Stochastic Approach Based on Rational Decision-Making for..:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
6
Enhancing Tunnel Safety for Dangerous Goods Vehicles throug..:
, In:
?
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
7
Short Signatures via Multiple Hardware Security Modules wit..:
, In:
?
Product-Focused Software Process Improvement; Lecture Notes in Computer Science ,
8
Quality Metrics for Software Development Management and Dec..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
9
How to Design Authenticated Key Exchange for Wearable Devic..:
, In:
?
Lecture Notes in Computer Science; Risks and Security of Internet and Systems ,
10
Authenticated Multi-proxy Accumulation Schemes for Delegate..:
, In:
?
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
12
Cryptanalysis of Deterministic and Probabilistic Multi-Copy..:
, In:
?
2020 IEEE 19th International Symposium on Network Computing and Applications (NCA) ,
13