Henrich Christopher Pöhls

Orcid: 0000-0002-7256-0387

Affiliations:
  • University of Passau, Germany


According to our database1, Henrich Christopher Pöhls authored at least 58 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Survey on Anonymous Communication Systems With a Focus on Dining Cryptographers Networks.
IEEE Access, 2023

Towards a Unified Abstract Architecture to Coherently and Generically Describe Security Goals and Risks of AI Systems.
Proceedings of the Security and Trust Management - 19th International Workshop, 2023

2022
Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
Towards GDPR-compliant data processing in modern SIEM systems.
Comput. Secur., 2021

TLS Beyond the Broker: Enforcing Fine-Grained Security and Trust in Publish/Subscribe Environments for IoT.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

2020
Fully invisible protean signatures schemes.
IET Inf. Secur., 2020

Dynamic Consent: Physical Switches and Feedback to Adjust Consent to IoT Data Collection.
Proceedings of the Distributed, Ambient and Pervasive Interactions, 2020

Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications.
Proceedings of the 2020 Global Internet of Things Summit, 2020

2019
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net.
J. Reliab. Intell. Environ., 2019

2018
Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures
PhD thesis, 2018

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications.
IACR Cryptol. ePrint Arch., 2018

Protean Signature Schemes.
IACR Cryptol. ePrint Arch., 2018

The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017

Towards compactly encoded signed IoT messages.
Proceedings of the 22nd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2017

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A New Architecture for Developing Cryptographic Cloud Services.
ERCIM News, 2016

Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

ECDSA on Things: IoT Integrity Protection in Practise.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016

PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Cryptographically Enforced Four-Eyes Principle.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A General Framework for Redactable Signatures and New Constructions.
IACR Cryptol. ePrint Arch., 2015

Towards Authenticity and Privacy Preserving Accountable Workflows.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Towards a New Paradigm for Privacy and Security in Cloud Services.
Proceedings of the Cyber Security and Privacy, 2015

Accountable Redactable Signatures.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects.
Proceedings of the 2014 IEEE Wireless Communications and Networking Conference Workshops, 2014

Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Enabling reliable and secure IoT-based smart city applications.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

On the Relation between Redactable and Sanitizable Signature Schemes.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Aggregation and perturbation in practice: Case-study of privacy, accuracy & performance.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

On Updatable Redactable Signatures.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Malleable Signatures for Resource Constrained Platforms.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Scope of Security Properties of Sanitizable Signatures Revisited.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Rechtsfolgen editierbarer Signaturen.
Datenschutz und Datensicherheit, 2012

Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction.
Proceedings of the SECRYPT 2012, 2012

Redactable Signatures for Independent Removal of Structure and Content.
Proceedings of the Information Security Practice and Experience, 2012

Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012

Non-interactive Public Accountability for Sanitizable Signatures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

On Structural Signatures for Tree Data Structures.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Sanitizable signed privacy preferences for social networks.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Why Showing One TLS Certificate is not Enough - Towards a Browser Feedback for Multiple TLS Certificate Verifications.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions.
Proceedings of the 6th World Congress on Services, 2010

2008
ConCert: Content Revocation Using Certificates.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Authenticity: The missing link in the social semantic web.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

2006
Smartcard Firewalls Revisited.
Proceedings of the Smart Card Research and Advanced Applications, 2006


  Loading...