Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Performance Model for Byzantine Fault Tolerant (Storage) Services., , and . CoRR, (2021)Key Management of Quantum Generated Keys in IPsec., , , , , , and . SECRYPT, page 177-183. INSTICC Press, (2008)PRISMACLOUD - Privacy and Security Maintaining Services in the Cloud., , and . ERCIM News, (2016)Towards a Performance Model for Byzantine Fault Tolerant Services., , and . CLOSER, page 178-189. SCITEPRESS, (2022)Malicious Clients in Distributed Secret Sharing Based Storage Networks., , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 206-214. Springer, (2016)The Archistar Secret-Sharing Backup Proxy., , and . ARES, page 88:1-88:8. ACM, (2017)Outsourced Computations Maintaining Confidentiality and Authenticity., , , and . ERCIM News, (2023)Passive ROADM Flexibility in Optical Access With Spectral and Spatial Reconfigurability., , , , , , , , and . IEEE J. Sel. Areas Commun., 33 (12): 2837-2846 (2015)A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management., , and . CCSW, page 41-51. ACM, (2022)A fast and resource efficient FPGA implementation of secret sharing for storage applications., , and . DATE, page 654-659. IEEE, (2018)