Jens-Matthias Bohli

According to our database1, Jens-Matthias Bohli authored at least 46 papers between 2002 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains.
IEEE Trans. Serv. Comput., 2022

2021
Outsourcing Proofs of Retrievability.
IEEE Trans. Cloud Comput., 2021

Regulating Storage Overhead in Existing PoW-based Blockchains.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

2020
Building Group Key Establishment on Group Theory: A Modular Approach.
Symmetry, 2020

2019
Password-Authenticated Group Key Establishment from Smooth Projective Hash Functions.
Int. J. Appl. Math. Comput. Sci., 2019

2017
Sharding PoW-based Blockchains via Proofs of Knowledge.
IACR Cryptol. ePrint Arch., 2017

A Comparison of Payment Schemes for the IoT.
Proceedings of the Open Identity Summit 2017, 2017

Securing Proof-of-Stake Blockchain Protocols.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Sharing Proofs of Retrievability across Tenants.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
SPORT: Sharing Proofs of Retrievability across Tenants.
IACR Cryptol. ePrint Arch., 2016

Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud.
Proceedings of the 25th USENIX Security Symposium, 2016

RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

2015
Selective decryption of outsourced IoT data.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

SMARTIE project: Secure IoT data management for smart cities.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Transparent Data Deduplication in the Cloud.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
PrivLoc: Preventing Location Tracking in Geofencing Services.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Outsourced Proofs of Retrievability.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Security and Privacy-Enhancing Multicloud Architectures.
IEEE Trans. Dependable Secur. Comput., 2013

2012
Assisting Server for Secure Multi-Party Computation.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

2011
Relations among privacy notions.
ACM Trans. Inf. Syst. Secur., 2011

Dependable Over-the-Air Programming.
Ad Hoc Sens. Wirel. Networks, 2011

Resilient data aggregation for unattended WSNs.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Security Prospects through Cloud Computing by Adopting Multiple Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Security Solutions for Uplink- and Downlink-Traffic in Wireless Sensor Networks (Sicherheitslösungen für Uplink- und Downlink-Verkehr in drahtlosen Sensornetzen).
it Inf. Technol., 2010

2009
Enhancing electronic voting machines on the example of Bingo voting.
IEEE Trans. Inf. Forensics Secur., 2009

Initial observations on economics, pricing, and penetration of the internet of things market.
Comput. Commun. Rev., 2009

A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier tau-time signature scheme.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Security enhanced multi-hop over the air reprogramming with Fountain Codes.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

2008
Key-Substitution-Angriffe und das Signaturgesetz.
Datenschutz und Datensicherheit, 2008

A secure and resilient WSN roadside architecture for intelligent transport systems.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2007
Interne Angreifer in der Kryptographie: digitale Signatur und Schlüsselaustausch.
PhD thesis, 2007

Secure group key establishment revisited.
Int. J. Inf. Sec., 2007

Bingo Voting: Secure and coercion-free voting using a trusted random number generator.
IACR Cryptol. ePrint Arch., 2007

(Password) Authenticated Key Establishment: From 2-Party to Group.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

2006
Key substitution attacks revisited: Taking into account malicious signers.
Int. J. Inf. Sec., 2006

Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String.
IACR Cryptol. ePrint Arch., 2006

Towards Provably Secure Group Key Agreement Building on Group Theory.
IACR Cryptol. ePrint Arch., 2006

Deniable Group Key Agreement.
Proceedings of the Progressin Cryptology, 2006

A Subliminal-Free Variant of ECDSA.
Proceedings of the Information Hiding, 8th International Workshop, 2006

A Framework for Robust Group Key Agreement.
Proceedings of the Computational Science and Its Applications, 2006

2005
Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security.
IACR Cryptol. ePrint Arch., 2005

Weak Keys in <i>MST</i><sub>1</sub>.
Des. Codes Cryptogr., 2005

Fairness and Correctness in Case of a Premature Abort.
Proceedings of the Progress in Cryptology, 2005

2004
On Subliminal Channels in Deterministic Signature Schemes.
Proceedings of the Information Security and Cryptology, 2004

2002
Weak Keys in MST1.
IACR Cryptol. ePrint Arch., 2002


  Loading...