Author of the publication

Secure Mobile Communication via Identity-based Cryptography and Server-aided Computations

, , , and . Journal of Supercomputing, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spread of invasive ragweed: climate change, management and how to reduce allergy costs, , , , , , and . Journal of Applied Ecology, 50 (6): 1422--1430 (December 2013)Semi-Supervised Audio Representation Learning for Modeling Beehive Strengths., , , , and . CoRR, (2021)Thermal infrared radiosity and heat diffusion model verification and validation., , , , and . WHISPERS, page 1-4. IEEE, (2010)A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players., , and . SOUPS @ USENIX Security Symposium, page 553-572. USENIX Association, (2021)No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations, , , and . Network and Distributed System Security (NDSS), ISOC, (2015)Participatory Design for Security-Related User Interfaces, , and . 22nd Annual Network and Distributed System Security Symposium, San Diego, California, USA, The Internet Society, (April 2015)Reduce response time: get "hooked" on a wiki., , and . SIGUCCS, page 185-189. ACM, (2007)Poster: Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , and . In Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, (August 2018)Using 3D modelling and game engine technologies for interactive exploration of cultural heritage: An evaluation of four game engines in relation to roman archaeological heritage., , and . Digit. Appl. Archaeol. Cult. Heritage, (2019)Secret Program Execution in the Cloud applying Homomorphic Encryption, , , and . Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 114-119, (2011)