Alexander Mühle

Orcid: 0000-0002-2513-0181

According to our database1, Alexander Mühle authored at least 20 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling.
Int. J. Inf. Sec., October, 2023

One to Bind Them: Binding Verifiable Credentials to User Attributes.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Requirements of a Digital Education Credential System.
Proceedings of the IEEE Global Engineering Education Conference, 2023

A Taxonomy of Decentralized Identifier Methods for Practitioners.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2023

Quo Vadis, Web Authentication? - An Empirical Analysis of Login Methods on the Internet.
Proceedings of the Advanced Information Networking and Applications, 2023

Prison Break: From Proprietary Data Sources to SSI Verifiable Credentials.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply Privacy- and Authenticity-Enhancing Technologies.
Proceedings of the Trust, Privacy and Security in Digital Business, 2022

2021
ATIB: Design and Evaluation of an Architecture for Brokered Self-Sovereign Identity Integration and Trust-Enhancing Attribute Aggregation for Service Provider.
IEEE Access, 2021

Analyzing Interoperability and Portability Concepts for Self-Sovereign Identity.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Gotta Catch'em All! Improving P2P Network Crawling Strategies.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

Characterising Proxy Usage in the Bitcoin Peer-to-Peer Network.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

2020
A Taxonomy of Trust Models for Attribute Assurance in Identity Management.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

An Integration Architecture to Enable Service Providers for Self-sovereign Identity.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

A Comparative Analysis of Trust Requirements in Decentralized Identity Management.
Proceedings of the Advanced Information Networking and Applications, 2019

MalRank: a measure of maliciousness in SIEM-based knowledge graphs.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
A survey on essential components of a self-sovereign identity.
Comput. Sci. Rev., 2018

On the Relevance of Blockchain in Identity Management.
CoRR, 2018

A Quantifiable Trust Model for Blockchain-Based Identity Management.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018


  Loading...