Jens-Matthias Bohli
According to our database1,
Jens-Matthias Bohli
authored at least 46 papers
between 2002 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
IEEE Trans. Serv. Comput., 2022
2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
2020
2019
Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions.
Int. J. Appl. Math. Comput. Sci., 2019
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Open Identity Summit 2017, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
2011
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen).
it Inf. Technol., 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Initial observations on economics, pricing, and penetration of the internet of things market.
Comput. Commun. Rev., 2009
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
2008
Datenschutz und Datensicherheit, 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
2007
PhD thesis, 2007
Bingo Voting: Secure and coercion-free voting using a trusted random number generator.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
2006
Int. J. Inf. Sec., 2006
Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Proceedings of the Computational Science and Its Applications, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Progress in Cryptology, 2005
2004
Proceedings of the Information Security and Cryptology, 2004
2002