Armknecht, F., Bohli, J.-M., Karame, G. O., Liu, Z. and Reuter, C. A. (2014). Outsourced Proofs of Retrievability.
In , Proceedings of the 21st ACM Conference on Computer and Communications Security : CCS'14 ; November 3–7, 2014, Scottsdale, Arizona, USA (S. 831–843). CCS,
ACM: New York, NY.
Armknecht, F., Gagliardoni, T., Katzenbeisser, S. and Peter, A. (2014). General Impossibility of Group Homomorphic Encryption in the Quantum World.
In , Public-Key Cryptography – PKC 2014 : 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings (S. 556–573). Lecture Notes in Computer Science,
Springer: Berlin [u.a.].
Armknecht, F., Hamann, M. and Krause, M. (2014). Hardware Efficient Authentication based on Random Selection.
In , Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit : [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. – 21. März 2014 in Wien (S. 169–185). GI-Edition : Lecture Notes in Informatics. Proceedings,
Ges. für Informatik: Bonn.
Armknecht, F., Hamann, M. and Mikhalev, V. (2014). Lightweight Authentication Protocols on Ultra-Constrained RFIDs – Myths and Facts.
In , Radio Frequency Identification: Security and Privacy Issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21–23, 2014, Revised Selected Papers (S. 1–18). Lecture Notes in Computer Science,
Springer: Berlin [u.a.].
Armknecht, F., Hauptmann, M., Roos, S. and Strufe, T. (2014). An additional protection layer for confidential OSNs posts.
In , ICC 2014 – 2014 IEEE International Conference on Communications : Sydney, Australia, 10 – 14 June 2014 (S. 3746-3752). ICC,
IEEE: Piscataway, NJ.
Armknecht, F. and Mikhalev, V. (2014). On Increasing the Throughput of Stream Ciphers.
In , Topics in Cryptology – CT-RSA 2014 : The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings (S. 132–151). Lecture Notes in Computer Science,
Springer: Berlin [u.a.].
Mikhalev, V. and Armknecht, F. (2014). Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers.
In , Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28 – 30 August, 2014 ; [part of ICETE 2014, 11th International Joint Conference on E-Business and Telecommunications] (S. 379–386). Lectute Notes in Computer Science,
SCITEPRESS: Setúbal, Portugal.
Senftleben, M., Bucicoiu, M., Tews, E., Armknecht, F., Katzenbeisser, S. and Sadeghi, A.-R. (2014). MoP-2-MoP – Mobile Private Microblogging.
In , Financial Cryptography and Data Security : 18th International Conference, FC 2014, Christ Church, Barbados, March 3–7, 2014, Revised Selected Papers (S. 384–396). Lecture Notes in Computer Science,
Springer: Berlin [u.a.].
In order to improve performance and enhance the user experience for the visitors to our website, we use cookies and store anonymous usage data. For more information please read our privacy policy.