Æȷοì
Henrich C. Pöhls
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures
J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on ¡¦, 2017
1762017
Building the hyperconnected society-internet of things research and innovation value chains, ecosystems and markets
O Vermesan, P Friess
Taylor & Francis, 2015
1312015
RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects
HC Pöhls, V Angelakis, S Suppan, K Fischer, G Oikonomou, EZ Tragos, ...
2014 IEEE wireless communications and networking conference workshops (WCNCW ¡¦, 2014
1272014
Enabling reliable and secure IoT-based smart city applications
EZ Tragos, V Angelakis, A Fragkiadakis, D Gundlegard, CS Nechifor, ...
2014 IEEE International Conference on Pervasive Computing and Communication ¡¦, 2014
802014
Redactable signatures for independent removal of structure and content
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H De Meer
Information Security Practice and Experience: 8th International Conference ¡¦, 2012
722012
Designing, developing, and facilitating smart cities: urban design to IoT solutions
V Angelakis, E Tragos, HC Pöhls, A Kapovits, A Bassi
Springer, 2016
682016
A general framework for redactable signatures and new constructions
D Derler, HC Pöhls, K Samelin, D Slamanig
International Conference on Information Security and Cryptology, 3-19, 2015
622015
Non-interactive public accountability for sanitizable signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 9th European Workshop ¡¦, 2013
592013
On updatable redactable signatures
HC Pöhls, K Samelin
Applied Cryptography and Network Security: 12th International Conference ¡¦, 2014
542014
Efficient and perfectly unlinkable sanitizable signatures without group signatures
C Brzuska, HC Pöhls, K Samelin
Public Key Infrastructures, Services and Applications: 10th European ¡¦, 2014
502014
JSON sensor signatures (JSS): End-to-end integrity protection from constrained device to IoT application
HC Pöhls
2015 9th International Conference on Innovative Mobile and Internet Services ¡¦, 2015
452015
Sanitizable signatures in XML signature—performance, mixing properties, and revisiting the property of transparency
HC Pöhls, K Samelin, J Posegga
Applied Cryptography and Network Security: 9th International Conference ¡¦, 2011
442011
Accountable redactable signatures
HC Pöhls, K Samelin
2015 10th International Conference on Availability, Reliability and Security ¡¦, 2015
422015
Towards GDPR-compliant data processing in modern SIEM systems
F Menges, T Latzo, M Vielberth, S Sobola, HC Pöhls, B Taubmann, ...
Computers & Security 103, 102165, 2021
412021
On structural signatures for tree data structures
K Samelin, HC Pöhls, A Bilzhause, J Posegga, H de Meer
Applied Cryptography and Network Security: 10th International Conference ¡¦, 2012
402012
On the relation between redactable and sanitizable signature schemes
H De Meer, HC Pöhls, J Posegga, K Samelin
International Symposium on Engineering Secure Software and Systems, 113-130, 2014
382014
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device
M Mössinger, B Petschkuhn, J Bauer, RC Staudemeyer, M Wójcik, ...
IEEE WOWMOM 2016, 2016
362016
ECDSA on things: IoT integrity protection in practise
J Bauer, RC Staudemeyer, HC Pöhls, A Fragkiadakis
Information and Communications Security: 18th International Conference ¡¦, 2016
342016
Position paper: the past, present, and future of sanitizable and redactable signatures
A Bilzhause, HC Pöhls, K Samelin
Proceedings of the 12th International Conference on Availability ¡¦, 2017
322017
A privacy engineering framework for the internet of things
A Kung, F Kargl, S Suppan, J Cuellar, HC Pöhls, A Kapovits, ...
Data protection and privacy:(In) visibilities and Infrastructures, 163-202, 2017
302017
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20