Author of the publication

Model-Driven Engineering for Multi-party Interactions on a Blockchain - An Example.

, , and . ICSOC Workshops, volume 12019 of Lecture Notes in Computer Science, page 181-194. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers., , , , , and . SANER, page 307-317. IEEE, (2021)How to Bind Anonymous Credentials to Humans., , and . USENIX Security Symposium, page 3047-3064. USENIX Association, (2023)Multi-Shard Private Transactions for Permissioned Blockchains., , , , , and . CoRR, (2020)IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)Bypassing memory safety mechanisms through speculative control flow hijacks., , , , , and . CoRR, (2020)Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric., , , and . SRDS, page 324-333. IEEE, (2019)Model-Driven Engineering for Multi-party Interactions on a Blockchain - An Example., , and . ICSOC Workshops, volume 12019 of Lecture Notes in Computer Science, page 181-194. Springer, (2019)StreamChain: Building a Low-Latency Permissioned Blockchain For Enterprise Use-Cases., , , and . Blockchain, page 130-139. IEEE, (2021)On the (In)Security of ElGamal in OpenPGP., , and . Commun. ACM, 66 (6): 107-115 (June 2023)An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations., , , , , and . Comput. Secur., (2013)