Henrich C. Pöhls
Cited by
Cited by
Chameleon-Hashes with Ephemeral Trapdoors: And Applications to Invisible Sanitizable Signatures
J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects
HC Pöhls, V Angelakis, S Suppan, K Fischer, G Oikonomou, EZ Tragos, ...
2014 IEEE wireless communications and networking conference workshops (WCNCW …, 2014
Building the Hyperconnected Society-Internet of Things Research and Innovation Value Chains, Ecosystems and Markets
O Vermesan, P Friess
Taylor & Francis, 2015
Redactable Signatures for Independent Removal of Structure and Content.
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H De Meer
ISPEC 7232, 17-33, 2012
Enabling reliable and secure IoT-based smart city applications
EZ Tragos, V Angelakis, A Fragkiadakis, D Gundlegard, CS Nechifor, ...
2014 IEEE International Conference on Pervasive Computing and Communication …, 2014
A general framework for redactable signatures and new constructions
D Derler, HC Pöhls, K Samelin, D Slamanig
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013
On updatable redactable signatures
HC Pöhls, K Samelin
Applied Cryptography and Network Security: 12th International Conference …, 2014
Designing, developing, and facilitating smart cities: urban design to IoT solutions
V Angelakis, E Tragos, HC Pöhls, A Kapovits, A Bassi
Springer, 2016
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 10th European …, 2014
Sanitizable signatures in XML signature—performance, mixing properties, and revisiting the property of transparency
HC Pöhls, K Samelin, J Posegga
Applied Cryptography and Network Security: 9th International Conference …, 2011
JSON Sensor Signatures (JSS): end-to-end integrity protection from constrained device to IoT application
HC Pöhls
2015 9th International Conference on Innovative Mobile and Internet Services …, 2015
Accountable redactable signatures
HC Pöhls, K Samelin
2015 10th International Conference on Availability, Reliability and Security …, 2015
On the relation between redactable and sanitizable signature schemes
H De Meer, HC Pöhls, J Posegga, K Samelin
Engineering Secure Software and Systems: 6th International Symposium, ESSoS …, 2014
On structural signatures for tree data structures
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H de Meer
Applied Cryptography and Network Security: 10th International Conference …, 2012
Verifiable and revocable expression of consent to processing of aggregated personal data
HC Pöhls
Information and Communications Security: 10th International Conference …, 2008
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device
M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ...
IEEE WOWMOM 2016, 2016
Towards privacy-preserving local monitoring and evaluation of network traffic from IoT devices and corresponding mobile phone applications
F Klement, HC Pöhls, K Spielvogel
2020 Global Internet of Things Summit (GIoTS), 1-6, 2020
A privacy engineering framework for the internet of things
A Kung, F Kargl, S Suppan, J Cuellar, HC Pöhls, A Kapovits, ...
Data Protection and Privacy:(In) visibilities and Infrastructures, 163-202, 2017
ECDSA on things: IoT integrity protection in practise
J Bauer, RC Staudemeyer, HC Pöhls, A Fragkiadakis
Information and Communications Security: 18th International Conference …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20