Follow
Jens-Matthias Bohli
Jens-Matthias Bohli
NEC Laboratories Europe
Verified email at acm.org
Title
Cited by
Cited by
Year
A privacy model for smart metering
JM Bohli, C Sorge, O Ugus
2010 IEEE International Conference on Communications Workshops, 1-5, 2010
2632010
Securing proof-of-stake blockchain protocols
W Li, S Andreina, JM Bohli, G Karame
Data privacy management, cryptocurrencies and blockchain technology, 297-315, 2017
2242017
Security and privacy-enhancing multicloud architectures
JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau
IEEE Transactions on dependable and secure computing 10 (4), 212-224, 2013
2002013
Outsourced proofs of retrievability
F Armknecht, JM Bohli, GO Karame, Z Liu, CA Reuter
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1482014
Bingo voting: Secure and coercion-free voting using a trusted random number generator
JM Bohli, J Müller-Quade, S Röhrich
International Conference on E-Voting and Identity, 111-124, 2007
1272007
Transparent data deduplication in the cloud
F Armknecht, JM Bohli, GO Karame, F Youssef
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
992015
Secure group key establishment revisited
JM Bohli, MI González Vasco, R Steinwandt
International Journal of Information Security 6 (4), 243-254, 2007
982007
Rpids: Raspberry pi ids—a fruitful intrusion detection system for iot
A Sforzin, FG Mármol, M Conti, JM Bohli
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016
962016
Initial observations on economics, pricing, and penetration of the internet of things market
JM Bohli, C Sorge, D Westhoff
ACM SIGCOMM Computer Communication Review 39 (2), 50-55, 2009
922009
Security prospects through cloud computing by adopting multiple clouds
M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono
2011 IEEE 4th international conference on cloud computing, 565-572, 2011
752011
A secure and resilient WSN roadside architecture for intelligent transport systems
JM Bohli, A Hessler, O Ugus, D Westhoff
Proceedings of the first ACM conference on Wireless network security, 161-171, 2008
592008
SMARTIE project: Secure IoT data management for smart cities
JM Bohli, A Skarmeta, MV Moreno, D García, P Langendörfer
2015 International Conference on Recent Advances in Internet of Things (RIoT …, 2015
582015
Mirror: Enabling proofs of data replication and retrievability in the cloud
F Armknecht, L Barman, JM Bohli, GO Karame
25th USENIX Security Symposium (USENIX Security 16), 1051-1068, 2016
502016
(Password) authenticated key establishment: From 2-party to group
M Abdalla, JM Bohli, MIG Vasco, R Steinwandt
Theory of Cryptography Conference, 499-514, 2007
482007
Relations among privacy notions
JM Bohli, A Pashalidis
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-24, 2011
452011
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme
O Ugus, D Westhoff, JM Bohli
Proceedings of the second ACM conference on Wireless network security, 29-40, 2009
372009
A framework for robust group key agreement
JM Bohli
International Conference on Computational Science and Its Applications, 355-364, 2006
362006
Enhancing electronic voting machines on the example of Bingo voting
JM Bohli, C Henrich, C Kempka, JÖ Muller-Quade, S Rohrich
IEEE Transactions on Information Forensics and Security 4 (4), 745-750, 2009
312009
Weak keys in MST1
JM Bohli, R Steinwandt, MIG Vasco, C Martinez
Designs, Codes and Cryptography 37 (3), 509-524, 2005
312005
Security and privacy challenge in data aggregation for the iot in smart cities
JM Bohli, P Langendorfer, AF Skarmeta
Internet of Things: Converging Technologies for Smart Environments and …, 2013
302013
The system can't perform the operation now. Try again later.
Articles 1–20