Folgen
Henrich C. Pöhls
Henrich C. Pöhls
Bestätigte E-Mail-Adresse bei uni-passau.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects
HC Pöhls, V Angelakis, S Suppan, K Fischer, G Oikonomou, EZ Tragos, ...
2014 IEEE wireless communications and networking conference workshops (WCNCW …, 2014
1162014
Building the Hyperconnected Society-Internet of Things Research and Innovation Value Chains, Ecosystems and Markets
O Vermesan, P Friess
Taylor & Francis, 2015
1062015
Chameleon-Hashes with Ephemeral Trapdoors: And Applications to Invisible Sanitizable Signatures
J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
992017
Redactable Signatures for Independent Removal of Structure and Content.
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H De Meer
ISPEC 7232, 17-33, 2012
692012
Enabling reliable and secure IoT-based smart city applications
EZ Tragos, V Angelakis, A Fragkiadakis, D Gundlegard, CS Nechifor, ...
2014 IEEE International Conference on Pervasive Computing and Communication …, 2014
652014
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013
532013
A general framework for redactable signatures and new constructions
D Derler, HC Pöhls, K Samelin, D Slamanig
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
522016
On updatable redactable signatures
HC Pöhls, K Samelin
Applied Cryptography and Network Security: 12th International Conference …, 2014
492014
Designing, developing, and facilitating smart cities: urban design to IoT solutions
V Angelakis, E Tragos, HC Pöhls, A Kapovits, A Bassi
Springer, 2016
462016
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 10th European …, 2014
422014
Sanitizable signatures in XML signature—performance, mixing properties, and revisiting the property of transparency
HC Pöhls, K Samelin, J Posegga
Applied Cryptography and Network Security: 9th International Conference …, 2011
422011
JSON Sensor Signatures (JSS): end-to-end integrity protection from constrained device to IoT application
HC Pöhls
2015 9th International Conference on Innovative Mobile and Internet Services …, 2015
402015
Accountable redactable signatures
HC Pöhls, K Samelin
2015 10th International Conference on Availability, Reliability and Security …, 2015
372015
On the relation between redactable and sanitizable signature schemes
H De Meer, HC Pöhls, J Posegga, K Samelin
Engineering Secure Software and Systems: 6th International Symposium, ESSoS …, 2014
372014
On structural signatures for tree data structures
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H de Meer
Applied Cryptography and Network Security: 10th International Conference …, 2012
342012
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device
M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ...
IEEE WOWMOM 2016, 2016
282016
Verifiable and revocable expression of consent to processing of aggregated personal data
HC Pöhls
Information and Communications Security: 10th International Conference …, 2008
282008
A privacy engineering framework for the internet of things
A Kung, F Kargl, S Suppan, J Cuellar, HC Pöhls, A Kapovits, ...
Data Protection and Privacy:(In) visibilities and Infrastructures, 163-202, 2017
252017
Towards privacy-preserving local monitoring and evaluation of network traffic from IoT devices and corresponding mobile phone applications
F Klement, HC Pöhls, K Spielvogel
2020 Global Internet of Things Summit (GIoTS), 1-6, 2020
222020
Position paper: the past, present, and future of sanitizable and redactable signatures
A Bilzhause, HC Pöhls, K Samelin
Proceedings of the 12th International Conference on Availability …, 2017
222017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20