Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Schnorr-based implicit certification: improving the security and efficiency of V2X communications., , , and . IACR Cryptology ePrint Archive, (2019)OCP: A protocol for secure communication in federated content networks., , , , and . Comput. Commun., (2015)A Taxonomy Model for Cloud Computing Services., , , , , , and . CLOSER, page 56-65. SciTePress, (2011)Privacy-preserving linkage/revocation of VANET certificates without LAs., , , , , and . IACR Cryptology ePrint Archive, (2018)A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks., , , , , and . IACR Cryptology ePrint Archive, (2018)Revocation in Vehicular Public Key Infrastructures: Balancing privacy and efficiency., , , , and . Veh. Commun., (2021)Faster verification of V2X BSM messages via Message Chaining., , , , and . IACR Cryptol. ePrint Arch., (2022)Faster isogeny-based compressed key agreement., , , , and . IACR Cryptol. ePrint Arch., (2017)A family of implementation-friendly BN elliptic curves., , , and . J. Syst. Softw., 84 (8): 1319-1326 (2011)Designing and Assessing Multi-tenant Isolation Strategies for Cloud Networks., , and . ICIN, page 214-221. IEEE, (2019)