Jens-Matthias Bohli
Jens-Matthias Bohli
NEC Laboratories Europe
Verified email at acm.org
TitleCited byYear
A privacy model for smart metering
JM Bohli, C Sorge, O Ugus
2010 IEEE International Conference on Communications Workshops, 1-5, 2010
2042010
Security and privacy-enhancing multicloud architectures
JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau
IEEE Transactions on Dependable and Secure Computing 10 (4), 212-224, 2013
1592013
Bingo voting: Secure and coercion-free voting using a trusted random number generator
JM Bohli, J Müller-Quade, S Röhrich
International Conference on E-Voting and Identity, 111-124, 2007
992007
Outsourced proofs of retrievability
F Armknecht, JM Bohli, GO Karame, Z Liu, CA Reuter
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
882014
Secure group key establishment revisited
JM Bohli, MIG Vasco, R Steinwandt
International Journal of Information Security 6 (4), 243-254, 2007
882007
Initial observations on economics, pricing, and penetration of the internet of things market
JM Bohli, C Sorge, D Westhoff
ACM SIGCOMM Computer Communication Review 39 (2), 50-55, 2009
762009
Security prospects through cloud computing by adopting multiple clouds
M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono
2011 IEEE 4th international conference on cloud computing, 565-572, 2011
682011
Transparent data deduplication in the cloud
F Armknecht, JM Bohli, GO Karame, F Youssef
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
582015
Securing proof-of-stake blockchain protocols
W Li, S Andreina, JM Bohli, G Karame
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 297-315, 2017
532017
RPiDS: Raspberry Pi IDS—A Fruitful Intrusion Detection System for IoT
A Sforzin, FG Mármol, M Conti, JM Bohli
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016
532016
A secure and resilient WSN roadside architecture for intelligent transport systems
JM Bohli, A Hessler, O Ugus, D Westhoff
Proceedings of the first ACM conference on Wireless network security, 161-171, 2008
512008
(Password) authenticated key establishment: from 2-party to group
M Abdalla, JM Bohli, MIG Vasco, R Steinwandt
Theory of Cryptography Conference, 499-514, 2007
422007
SMARTIE project: Secure IoT data management for smart cities
JM Bohli, A Skarmeta, MV Moreno, D García, P Langendörfer
2015 International Conference on Recent Advances in Internet of Things (RIoT …, 2015
342015
Relations among privacy notions
JM Bohli, A Pashalidis
ACM Transactions on Information and System Security (TISSEC) 14 (1), 4, 2011
342011
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme
O Ugus, D Westhoff, JM Bohli
Proceedings of the second ACM conference on Wireless network security, 29-40, 2009
342009
A framework for robust group key agreement
JM Bohli
International Conference on Computational Science and Its Applications, 355-364, 2006
332006
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks
E De Cristofaro, JM Bohli, D Westhoff
Proceedings of the second ACM conference on Wireless network security, 253-260, 2009
282009
Deniable group key agreement
JM Bohli, R Steinwandt
International Conference on Cryptology in Vietnam, 298-311, 2006
262006
Security enhanced multi-hop over the air reprogramming with fountain codes
JM Bohli, A Hessler, O Ugus, D Westhoff
2009 IEEE 34th Conference on Local Computer Networks, 850-857, 2009
252009
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String.
JM Bohli, MIG Vasco, R Steinwandt
IACR Cryptology ePrint Archive 2006, 214, 2006
252006
The system can't perform the operation now. Try again later.
Articles 1–20