The SCEAS System
Navigation Menu

Search the dblp DataBase


Jens-Matthias Bohli: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jens-Matthias Bohli
    A Framework for Robust Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:355-364 [Conf]
  2. Jens-Matthias Bohli, Rainer Steinwandt
    On Subliminal Channels in Deterministic Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:182-194 [Conf]
  3. Jens-Matthias Bohli, Jörn Müller-Quade, Stefan Röhrich
    Fairness and Correctness in Case of a Premature Abort. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:322-331 [Conf]
  4. Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    (Password) Authenticated Key Establishment: From 2-Party to Group. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:499-514 [Conf]
  5. Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
    Towards Provably Secure Group Key Agreement Building on Group Theory. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:322-336 [Conf]
  6. Jens-Matthias Bohli, Rainer Steinwandt
    Deniable Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:298-311 [Conf]
  7. Jens-Matthias Bohli, Rainer Steinwandt, Maria Isabel Gonzalez Vasco, Consuelo Martínez
    Weak Keys in MST1. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:509-524 [Journal]
  8. Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt
    Key substitution attacks revisited: Taking into account malicious signers. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:1, pp:30-36 [Journal]
  9. Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    A Subliminal-Free Variant of ECDSA. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:375-387 [Conf]
  10. Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    Secure group key establishment revisited. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:4, pp:243-254 [Journal]

  11. Relations Among Privacy Notions. [Citation Graph (, )][DBLP]

  12. Security enhanced multi-hop over the air reprogramming with Fountain Codes. [Citation Graph (, )][DBLP]

  13. Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator. [Citation Graph (, )][DBLP]

  14. A secure and resilient WSN roadside architecture for intelligent transport systems. [Citation Graph (, )][DBLP]

  15. FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. [Citation Graph (, )][DBLP]

  16. A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. [Citation Graph (, )][DBLP]

  17. Initial observations on economics, pricing, and penetration of the internet of things market. [Citation Graph (, )][DBLP]

  18. FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002