Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure group communication in constrained networks - A gap analysis., , and . GIoTS, page 1-4. IEEE, (2017)Quantum-Resistant MACsec and IPsec for Virtual Private Networks., , , , , , , and . SSR, volume 13895 of Lecture Notes in Computer Science, page 1-21. Springer, (2023)A formal analysis of IKEv2's post-quantum extension., , , , and . ACSAC, page 91-105. ACM, (2021)Secure group key distribution in constrained environments with IKEv2., , , and . DSC, page 384-391. IEEE, (2017)Authentication in dynamic groups using identity-based signatures., , and . WiMob, page 1-6. IEEE, (2018)A Secure Cell-Attachment Procedure of LDACS., , , , , , and . EuroS&P Workshops, page 113-122. IEEE, (2021)Efficient Signature Verification and Key Revocation using Identity Based Cryptography.. Ludwig Maximilian University of Munich, Germany, (2020)OnCall Operator Scheduling for Satellites with Grover's Algorithm., , , , , and . ICCS (6), volume 12747 of Lecture Notes in Computer Science, page 17-29. Springer, (2021)Towards Quantum-resistant Virtual Private Networks., , , , , , , and . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2019)Reducing 2-QuBit Gate Count for ZX-Calculus based Quantum Circuit Optimization., , , and . QPL, volume 394 of EPTCS, page 29-45. (2022)