Outsourcing Proofs of Retrievability
Armknecht, Frederik, Bohli, Jens-Matthias, Karame, Ghassan, Li, Wenting
Published in IEEE transactions on cloud computing (01.01.2021)
Published in IEEE transactions on cloud computing (01.01.2021)
Get full text
Journal Article
PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains
Andreina, Sebastien, Bohli, Jens-Matthias, Karame, Ghassan O., Li, Wenting, Marson, Giorgia Azzurra
Published in IEEE transactions on services computing (01.07.2022)
Published in IEEE transactions on services computing (01.07.2022)
Get full text
Journal Article
Building Group Key Establishment on Group Theory: A Modular Approach
Bohli, Jens-Matthias, González Vasco, María I., Steinwandt, Rainer
Published in Symmetry (Basel) (01.02.2020)
Published in Symmetry (Basel) (01.02.2020)
Get full text
Journal Article
Secure group key establishment revisited
Bohli, Jens-Matthias, González Vasco, María Isabel, Steinwandt, Rainer
Published in International journal of information security (01.07.2007)
Published in International journal of information security (01.07.2007)
Get full text
Journal Article
Security and Privacy-Enhancing Multicloud Architectures
Bohli, J-M, Gruschka, N., Jensen, M., Iacono, L. L., Marnau, N.
Published in IEEE transactions on dependable and secure computing (01.07.2013)
Published in IEEE transactions on dependable and secure computing (01.07.2013)
Get full text
Journal Article
RPiDS: Raspberry Pi IDS - A Fruitful Intrusion Detection System for IoT
Sforzin, Alessandro, Gomez Marmol, Felix, Conti, Mauro, Bohli, Jens-Matthias
Published in 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (01.07.2016)
Published in 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld) (01.07.2016)
Get full text
Conference Proceeding
Key substitution attacks revisited: Taking into account malicious signers
Bohli, Jens-Matthias, Röhrich, Stefan, Steinwandt, Rainer
Published in International journal of information security (01.01.2006)
Published in International journal of information security (01.01.2006)
Get full text
Journal Article
A Privacy Model for Smart Metering
Bohli, Jens-Matthias, Sorge, Christoph, Ugus, Osman
Published in 2010 IEEE International Conference on Communications Workshops (01.05.2010)
Published in 2010 IEEE International Conference on Communications Workshops (01.05.2010)
Get full text
Conference Proceeding
Enhancing Electronic Voting Machines on the Example of Bingo Voting
Bohli, J.-M., Henrich, C., Kempka, C., Muller-Quade, J., Rohrich, S.
Published in IEEE transactions on information forensics and security (01.12.2009)
Published in IEEE transactions on information forensics and security (01.12.2009)
Get full text
Journal Article
Fairness and Correctness in Case of a Premature Abort
Bohli, Jens-Matthias, Müller-Quade, Jörn, Röhrich, Stefan
Published in Lecture notes in computer science (2005)
Published in Lecture notes in computer science (2005)
Get full text
Book Chapter
Conference Proceeding
Towards Provably Secure Group Key Agreement Building on Group Theory
Bohli, Jens-Matthias, Glas, Benjamin, Steinwandt, Rainer
Published in Lecture notes in computer science (2006)
Published in Lecture notes in computer science (2006)
Get full text
Book Chapter
Conference Proceeding
SMARTIE project: Secure IoT data management for smart cities
Bohli, Jens-Matthias, Skarmeta, Antonio, Victoria Moreno, M., Garcia, Dan, Langendorfer, Peter
Published in 2015 International Conference on Recent Advances in Internet of Things (RIoT) (01.04.2015)
Published in 2015 International Conference on Recent Advances in Internet of Things (RIoT) (01.04.2015)
Get full text
Conference Proceeding