Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017 | 157 | 2017 |
RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects HC Pöhls, V Angelakis, S Suppan, K Fischer, G Oikonomou, EZ Tragos, ... 2014 IEEE wireless communications and networking conference workshops (WCNCW …, 2014 | 125 | 2014 |
Building the hyperconnected society-internet of things research and innovation value chains, ecosystems and markets O Vermesan, P Friess Taylor & Francis, 2015 | 123 | 2015 |
Enabling reliable and secure IoT-based smart city applications EZ Tragos, V Angelakis, A Fragkiadakis, D Gundlegard, CS Nechifor, ... 2014 IEEE International Conference on Pervasive Computing and Communication …, 2014 | 75 | 2014 |
Redactable signatures for independent removal of structure and content K Samelin, HC Pöhls, A Bilzhause, J Posegga, H De Meer Information Security Practice and Experience: 8th International Conference …, 2012 | 70 | 2012 |
Designing, developing, and facilitating smart cities: urban design to IoT solutions V Angelakis, E Tragos, HC Pöhls, A Kapovits, A Bassi Springer, 2016 | 63 | 2016 |
A general framework for redactable signatures and new constructions D Derler, HC Pöhls, K Samelin, D Slamanig International Conference on Information Security and Cryptology, 3-19, 2015 | 61 | 2015 |
Non-interactive public accountability for sanitizable signatures C Brzuska, HC Pöhls, K Samelin Public Key Infrastructures, Services and Applications: 9th European Workshop …, 2013 | 56 | 2013 |
On updatable redactable signatures HC Pöhls, K Samelin Applied Cryptography and Network Security: 12th International Conference …, 2014 | 52 | 2014 |
Efficient and perfectly unlinkable sanitizable signatures without group signatures C Brzuska, HC Pöhls, K Samelin Public Key Infrastructures, Services and Applications: 10th European …, 2014 | 47 | 2014 |
JSON sensor signatures (JSS): End-to-end integrity protection from constrained device to IoT application HC Pöhls 2015 9th International Conference on Innovative Mobile and Internet Services …, 2015 | 44 | 2015 |
Sanitizable signatures in XML signature—performance, mixing properties, and revisiting the property of transparency HC Pöhls, K Samelin, J Posegga Applied Cryptography and Network Security: 9th International Conference …, 2011 | 44 | 2011 |
Accountable redactable signatures HC Pöhls, K Samelin 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 40 | 2015 |
On structural signatures for tree data structures K Samelin, HC Pöhls, A Bilzhause, J Posegga, H de Meer Applied Cryptography and Network Security: 10th International Conference …, 2012 | 38 | 2012 |
On the relation between redactable and sanitizable signature schemes H De Meer, HC Pöhls, J Posegga, K Samelin International Symposium on Engineering Secure Software and Systems, 113-130, 2014 | 37 | 2014 |
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ... IEEE WOWMOM 2016, 2016 | 33 | 2016 |
Towards GDPR-compliant data processing in modern SIEM systems F Menges, T Latzo, M Vielberth, S Sobola, HC Pöhls, B Taubmann, ... Computers & Security 103, 102165, 2021 | 32 | 2021 |
ECDSA on things: IoT integrity protection in practise J Bauer, RC Staudemeyer, HC Pöhls, A Fragkiadakis Information and Communications Security: 18th International Conference …, 2016 | 30 | 2016 |
Position paper: the past, present, and future of sanitizable and redactable signatures A Bilzhause, HC Pöhls, K Samelin Proceedings of the 12th International Conference on Availability …, 2017 | 29 | 2017 |
A privacy engineering framework for the internet of things A Kung, F Kargl, S Suppan, J Cuellar, HC Pöhls, A Kapovits, ... Data protection and privacy:(In) visibilities and Infrastructures, 163-202, 2017 | 29 | 2017 |