Henrich C. Pöhls
Title
Cited by
Cited by
Year
RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects
HC Pöhls, V Angelakis, S Suppan, K Fischer, G Oikonomou, EZ Tragos, ...
2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW …, 2014
902014
Building the hyperconnected society: Internet of things research and innovation value chains, ecosystems and markets
O Vermesan, P Friess
River Publishers, 2015
832015
Redactable signatures for independent removal of structure and content
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H De Meer
International Conference on Information Security Practice and Experience, 17-33, 2012
592012
Enabling reliable and secure IoT-based smart city applications
EZ Tragos, V Angelakis, A Fragkiadakis, D Gundlegard, CS Nechifor, ...
2014 IEEE International Conference on Pervasive Computing and Communication …, 2014
492014
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
European Public Key Infrastructure Workshop, 178-193, 2012
462012
Chameleon-hashes with ephemeral trapdoors
J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig
IACR International Workshop on Public Key Cryptography, 152-182, 2017
422017
On updatable redactable signatures
HC Pöhls, K Samelin
International Conference on Applied Cryptography and Network Security, 457-475, 2014
382014
Sanitizable signatures in XML signature—performance, mixing properties, and revisiting the property of transparency
HC Pöhls, K Samelin, J Posegga
International Conference on Applied Cryptography and Network Security, 166-182, 2011
362011
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
European Public Key Infrastructure Workshop, 12-30, 2013
352013
A general framework for redactable signatures and new constructions
D Derler, HC Pöhls, K Samelin, D Slamanig
ICISC 2015, 3-19, 2015
332015
On the relation between redactable and sanitizable signature schemes
H De Meer, HC Pöhls, J Posegga, K Samelin
International Symposium on Engineering Secure Software and Systems, 113-130, 2014
322014
JSON Sensor Signatures (JSS): end-to-end integrity protection from constrained device to IoT application
HC Pöhls
2015 9th International Conference on Innovative Mobile and Internet Services …, 2015
282015
On structural signatures for tree data structures
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H de Meer
International Conference on Applied Cryptography and Network Security, 171-187, 2012
262012
Designing, developing, and facilitating smart cities: urban design to IoT solutions
V Angelakis, E Tragos, HC Pöhls, A Kapovits, A Bassi
Springer, 2016
252016
Verifiable and revocable expression of consent to processing of aggregated personal data
HC Pöhls
International Conference on Information and Communications Security, 279-293, 2008
242008
Accountable redactable signatures
HC Pöhls, K Samelin
2015 10th International Conference on Availability, Reliability and Security …, 2015
232015
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device
M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ...
IEEE WOWMOM 2016, 2016
182016
An IoT middleware for enhanced security and privacy: The RERUM approach
G Moldovan, EZ Tragos, A Fragkiadakis, HC Pohls, D Calvo
2016 8th IFIP International Conference on New Technologies, Mobility and …, 2016
172016
PRISMACLOUD tools: a cryptographic toolbox for increasing security in cloud services
T Loruenser, D Slamanig, T Länger, HC Pöhls
2016 11th International Conference on Availability, Reliability and Security …, 2016
172016
Malleable signatures for resource constrained platforms
HC Pöhls, S Peters, K Samelin, J Posegga, H de Meer
IFIP International Workshop on Information Security Theory and Practices, 18-33, 2013
172013
The system can't perform the operation now. Try again later.
Articles 1–20