Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Data Collection Scheme from Short Group Signatures., , , and . ICETE (2), page 366-375. SciTePress, (2018)Multidevice Authentication with Strong Privacy Protection., , and . Wirel. Commun. Mob. Comput., (2018)Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection Methodology., , , , , and . ARES, page 66:1-66:7. ACM, (2023)A Privacy-Enhancing Framework for Internet of Things Services., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 77-97. Springer, (2019)Modern physical access control systems and privacy protection., , , and . TSP, page 1-5. IEEE, (2015)Cryptography for privacy-preserving electronic services., , , and . TSP, page 596-600. IEEE, (2015)Privacy-Enhancing Group Signcryption Scheme., , , and . IACR Cryptol. ePrint Arch., (2021)Privacy-Preserving Online Parking Based on Smart Contracts., , , and . ARES, page 153:1-153:10. ACM, (2021)Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials., , and . ARES, page 141:1-141:9. ACM, (2022)Secure Physical Access Control with Strong Cryptographic Protection., , and . SECRYPT, page 220-227. SciTePress, (2015)