A privacy model for smart metering JM Bohli, C Sorge, O Ugus 2010 IEEE International Conference on Communications Workshops, 1-5, 2010 | 235 | 2010 |
Security and privacy-enhancing multicloud architectures JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau IEEE Transactions on Dependable and Secure Computing 10 (4), 212-224, 2013 | 189 | 2013 |
Securing proof-of-stake blockchain protocols W Li, S Andreina, JM Bohli, G Karame Data Privacy Management, Cryptocurrencies and Blockchain Technology, 297-315, 2017 | 126 | 2017 |
Bingo voting: Secure and coercion-free voting using a trusted random number generator JM Bohli, J Müller-Quade, S Röhrich International Conference on E-Voting and Identity, 111-124, 2007 | 113 | 2007 |
Outsourced proofs of retrievability F Armknecht, JM Bohli, GO Karame, Z Liu, CA Reuter Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 112 | 2014 |
Secure group key establishment revisited JM Bohli, MIG Vasco, R Steinwandt International Journal of Information Security 6 (4), 243-254, 2007 | 98 | 2007 |
Initial observations on economics, pricing, and penetration of the internet of things market JM Bohli, C Sorge, D Westhoff ACM SIGCOMM Computer Communication Review 39 (2), 50-55, 2009 | 82 | 2009 |
Transparent data deduplication in the cloud F Armknecht, JM Bohli, GO Karame, F Youssef Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 76 | 2015 |
Rpids: Raspberry pi ids—a fruitful intrusion detection system for iot A Sforzin, FG Mármol, M Conti, JM Bohli 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016 | 74 | 2016 |
Security prospects through cloud computing by adopting multiple clouds M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono 2011 IEEE 4th international conference on cloud computing, 565-572, 2011 | 71 | 2011 |
A secure and resilient WSN roadside architecture for intelligent transport systems JM Bohli, A Hessler, O Ugus, D Westhoff Proceedings of the first ACM conference on Wireless network security, 161-171, 2008 | 58 | 2008 |
(Password) authenticated key establishment: from 2-party to group M Abdalla, JM Bohli, MIG Vasco, R Steinwandt Theory of Cryptography Conference, 499-514, 2007 | 47 | 2007 |
SMARTIE project: Secure IoT data management for smart cities JM Bohli, A Skarmeta, MV Moreno, D García, P Langendörfer 2015 International Conference on Recent Advances in Internet of Things (RIoT …, 2015 | 42 | 2015 |
Relations among privacy notions JM Bohli, A Pashalidis ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-24, 2011 | 39 | 2011 |
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme O Ugus, D Westhoff, JM Bohli Proceedings of the second ACM conference on Wireless network security, 29-40, 2009 | 37 | 2009 |
A framework for robust group key agreement JM Bohli International Conference on Computational Science and Its Applications, 355-364, 2006 | 35 | 2006 |
Mirror: Enabling proofs of data replication and retrievability in the cloud F Armknecht, L Barman, JM Bohli, GO Karame 25th {USENIX} Security Symposium ({USENIX} Security 16), 1051-1068, 2016 | 31 | 2016 |
Deniable group key agreement JM Bohli, R Steinwandt International Conference on Cryptology in Vietnam, 298-311, 2006 | 30 | 2006 |
Enhancing electronic voting machines on the example of Bingo voting JM Bohli, C Henrich, C Kempka, JÖ Muller-Quade, S Rohrich IEEE Transactions on Information Forensics and Security 4 (4), 745-750, 2009 | 29 | 2009 |
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks E De Cristofaro, JM Bohli, D Westhoff Proceedings of the second ACM conference on Wireless network security, 253-260, 2009 | 29 | 2009 |