Christian Schridde

According to our database1, Christian Schridde authored at least 13 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
On the construction of graphs with a planar bipartite double cover from boolean formulas and its application to counting satisfying solutions.
Theor. Comput. Sci., 2018

2016
Computing discrete logarithms using 𝒪((log q)2) operations from {+, -, ×, ÷, &}.
Groups Complex. Cryptol., 2016

2012
The permanent, graph gadgets and counting solutions for certain types of planar formulas
CoRR, 2012

2011
Secure mobile communication via identity-based cryptography and server-aided computations.
J. Supercomput., 2011

2010
Secure session framework: an identity-based cryptographic key agreement and signature protocol.
PhD thesis, 2010

An identity-based security infrastructure for Cloud environments.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Secure on-demand grid computing.
Future Gener. Comput. Syst., 2009

TrueIP: prevention of IP spoofing attacks using identity-based cryptography.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Securing Mobile Phone Calls with Identity-Based Cryptography.
Proceedings of the Advances in Information Security and Assurance, 2009

Identity-Based Cryptography for Securing Mobile Phone Calls.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
An Identity-Based Key Agreement Protocol for the Network Layer.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Securing stateful grid servers through virtual server rotation.
Proceedings of the 17th International Symposium on High-Performance Distributed Computing (HPDC-17 2008), 2008

On the Validity of the phi-Hiding Assumption in Cryptographic Protocols.
Proceedings of the Advances in Cryptology, 2008


  Loading...