Follow
Henrich C. Pöhls
Title
Cited by
Cited by
Year
Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures
J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
1662017
Building the hyperconnected society-internet of things research and innovation value chains, ecosystems and markets
O Vermesan, P Friess
Taylor & Francis, 2015
1262015
RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects
HC Pöhls, V Angelakis, S Suppan, K Fischer, G Oikonomou, EZ Tragos, ...
2014 IEEE wireless communications and networking conference workshops (WCNCW …, 2014
1262014
Enabling reliable and secure IoT-based smart city applications
EZ Tragos, V Angelakis, A Fragkiadakis, D Gundlegard, CS Nechifor, ...
2014 IEEE International Conference on Pervasive Computing and Communication …, 2014
792014
Redactable signatures for independent removal of structure and content
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H De Meer
Information Security Practice and Experience: 8th International Conference …, 2012
712012
Designing, developing, and facilitating smart cities: urban design to IoT solutions
V Angelakis, E Tragos, HC Pöhls, A Kapovits, A Bassi
Springer, 2016
652016
A general framework for redactable signatures and new constructions
D Derler, HC Pöhls, K Samelin, D Slamanig
International Conference on Information Security and Cryptology, 3-19, 2015
612015
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013
582013
On updatable redactable signatures
HC Pöhls, K Samelin
Applied Cryptography and Network Security: 12th International Conference …, 2014
522014
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 10th European …, 2014
492014
JSON sensor signatures (JSS): End-to-end integrity protection from constrained device to IoT application
HC Pöhls
2015 9th International Conference on Innovative Mobile and Internet Services …, 2015
442015
Sanitizable signatures in XML signature—performance, mixing properties, and revisiting the property of transparency
HC Pöhls, K Samelin, J Posegga
Applied Cryptography and Network Security: 9th International Conference …, 2011
442011
Accountable redactable signatures
HC Pöhls, K Samelin
2015 10th International Conference on Availability, Reliability and Security …, 2015
412015
On structural signatures for tree data structures
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H de Meer
Applied Cryptography and Network Security: 10th International Conference …, 2012
382012
Towards GDPR-compliant data processing in modern SIEM systems
F Menges, T Latzo, M Vielberth, S Sobola, HC Pöhls, B Taubmann, ...
Computers & Security 103, 102165, 2021
372021
On the relation between redactable and sanitizable signature schemes
H De Meer, HC Pöhls, J Posegga, K Samelin
International Symposium on Engineering Secure Software and Systems, 113-130, 2014
372014
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device
M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ...
IEEE WOWMOM 2016, 2016
352016
ECDSA on things: IoT integrity protection in practise
J Bauer, RC Staudemeyer, HC Pöhls, A Fragkiadakis
Information and Communications Security: 18th International Conference …, 2016
312016
Position paper: the past, present, and future of sanitizable and redactable signatures
A Bilzhause, HC Pöhls, K Samelin
Proceedings of the 12th International Conference on Availability …, 2017
302017
A privacy engineering framework for the internet of things
A Kung, F Kargl, S Suppan, J Cuellar, HC Pöhls, A Kapovits, ...
Data protection and privacy:(In) visibilities and Infrastructures, 163-202, 2017
302017
The system can't perform the operation now. Try again later.
Articles 1–20