|
Search the dblp DataBase
Jens-Matthias Bohli:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jens-Matthias Bohli
A Framework for Robust Group Key Agreement. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:355-364 [Conf]
- Jens-Matthias Bohli, Rainer Steinwandt
On Subliminal Channels in Deterministic Signature Schemes. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:182-194 [Conf]
- Jens-Matthias Bohli, Jörn Müller-Quade, Stefan Röhrich
Fairness and Correctness in Case of a Premature Abort. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:322-331 [Conf]
- Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
(Password) Authenticated Key Establishment: From 2-Party to Group. [Citation Graph (0, 0)][DBLP] TCC, 2007, pp:499-514 [Conf]
- Jens-Matthias Bohli, Benjamin Glas, Rainer Steinwandt
Towards Provably Secure Group Key Agreement Building on Group Theory. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:322-336 [Conf]
- Jens-Matthias Bohli, Rainer Steinwandt
Deniable Group Key Agreement. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:298-311 [Conf]
- Jens-Matthias Bohli, Rainer Steinwandt, Maria Isabel Gonzalez Vasco, Consuelo Martínez
Weak Keys in MST1. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2005, v:37, n:3, pp:509-524 [Journal]
- Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt
Key substitution attacks revisited: Taking into account malicious signers. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:30-36 [Journal]
- Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
A Subliminal-Free Variant of ECDSA. [Citation Graph (0, 0)][DBLP] Information Hiding, 2006, pp:375-387 [Conf]
- Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
Secure group key establishment revisited. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:4, pp:243-254 [Journal]
Relations Among Privacy Notions. [Citation Graph (, )][DBLP]
Security enhanced multi-hop over the air reprogramming with Fountain Codes. [Citation Graph (, )][DBLP]
Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator. [Citation Graph (, )][DBLP]
A secure and resilient WSN roadside architecture for intelligent transport systems. [Citation Graph (, )][DBLP]
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. [Citation Graph (, )][DBLP]
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme. [Citation Graph (, )][DBLP]
Initial observations on economics, pricing, and penetration of the internet of things market. [Citation Graph (, )][DBLP]
FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Wireless Sensor Networks [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|