Jens-Matthias Bohli
Jens-Matthias Bohli
NEC Laboratories Europe
E-mail megerősítve itt: acm.org
Cím
Hivatkozott rá
Hivatkozott rá
Év
A privacy model for smart metering
JM Bohli, C Sorge, O Ugus
2010 IEEE International Conference on Communications Workshops, 1-5, 2010
2272010
Security and privacy-enhancing multicloud architectures
JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau
IEEE Transactions on Dependable and Secure Computing 10 (4), 212-224, 2013
1802013
Bingo voting: Secure and coercion-free voting using a trusted random number generator
JM Bohli, J Müller-Quade, S Röhrich
International Conference on E-Voting and Identity, 111-124, 2007
1072007
Outsourced proofs of retrievability
F Armknecht, JM Bohli, GO Karame, Z Liu, CA Reuter
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1062014
Securing proof-of-stake blockchain protocols
W Li, S Andreina, JM Bohli, G Karame
Data Privacy Management, Cryptocurrencies and Blockchain Technology, 297-315, 2017
1052017
Secure group key establishment revisited
JM Bohli, MIG Vasco, R Steinwandt
International Journal of Information Security 6 (4), 243-254, 2007
932007
Initial observations on economics, pricing, and penetration of the internet of things market
JM Bohli, C Sorge, D Westhoff
ACM SIGCOMM Computer Communication Review 39 (2), 50-55, 2009
812009
Transparent data deduplication in the cloud
F Armknecht, JM Bohli, GO Karame, F Youssef
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
722015
RPiDS: Raspberry Pi IDS—a fruitful intrusion detection system for IoT
A Sforzin, FG Mármol, M Conti, JM Bohli
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016
672016
Security prospects through cloud computing by adopting multiple clouds
M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono
2011 IEEE 4th international conference on cloud computing, 565-572, 2011
672011
A secure and resilient WSN roadside architecture for intelligent transport systems
JM Bohli, A Hessler, O Ugus, D Westhoff
Proceedings of the first ACM conference on Wireless network security, 161-171, 2008
562008
(Password) authenticated key establishment: from 2-party to group
M Abdalla, JM Bohli, MIG Vasco, R Steinwandt
Theory of Cryptography Conference, 499-514, 2007
462007
SMARTIE project: Secure IoT data management for smart cities
JM Bohli, A Skarmeta, MV Moreno, D García, P Langendörfer
2015 International Conference on Recent Advances in Internet of Things (RIoT …, 2015
392015
Relations among privacy notions
JM Bohli, A Pashalidis
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-24, 2011
382011
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme
O Ugus, D Westhoff, JM Bohli
Proceedings of the second ACM conference on Wireless network security, 29-40, 2009
362009
A framework for robust group key agreement
JM Bohli
International Conference on Computational Science and Its Applications, 355-364, 2006
352006
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks
E De Cristofaro, JM Bohli, D Westhoff
Proceedings of the second ACM conference on Wireless network security, 253-260, 2009
292009
Enhancing electronic voting machines on the example of Bingo voting
JM Bohli, C Henrich, C Kempka, JÖ Muller-Quade, S Rohrich
IEEE transactions on information forensics and security 4 (4), 745-750, 2009
282009
Mirror: Enabling proofs of data replication and retrievability in the cloud
F Armknecht, L Barman, JM Bohli, GO Karame
25th {USENIX} Security Symposium ({USENIX} Security 16), 1051-1068, 2016
272016
Security enhanced multi-hop over the air reprogramming with fountain codes
JM Bohli, A Hessler, O Ugus, D Westhoff
2009 IEEE 34th Conference on local computer networks, 850-857, 2009
272009
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20