Browse by Person
![]() | Up a level |
Marson, Giorgia Azzurra ; Poettering, Bertram (2017):
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (1), pp. 405-426. DOI: 10.13154/tosc.v2017.i1.405-426,
[Article]
Günther, Felix ; Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3), pp. 281-297. Springer, ISSN 1615-5270,
[Article]
Günther, Felix ; Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), pp. 195-212,
Springer, Queensland University of Technology (QUT), Brisbane, Australia, [Conference or Workshop Item]
Poettering, Bertram (2012):
Privacy Protection for Authentication Protocols.
TU Darmstadt, FB Informatik,
[Ph.D. Thesis]
Manulis, Mark ; Poettering, Bertram ; Tsudik, Gene (2010):
Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
In: LNCS, In: 10th Privacy Enhancing Technologies Symposium (PETS 2010),
Springer, [Conference or Workshop Item]
Manulis, Mark ; Poettering, Bertram ; Tsudik, Gene (2010):
Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
In: LNCS, In: 8th International Confrence on Applied Cryptography and Network Security (ACNS 2010),
Springer, [Conference or Workshop Item]
Manulis, Mark ; Pinkas, Benny ; Poettering, Bertram (2010):
Privacy-Preserving Group Discovery with Linear Complexity.
In: LNCS, In: 8th International Conference on Applied Cryptography and Network Security (ACNS 2010),
Springer, [Conference or Workshop Item]
Brzuska, Christina ; Busch, Heike ; Dagdelen, Özgür ; Fischlin, Marc ; Franz, Martin ; Katzenbeisser, Stefan ; Manulis, Mark ; Onete, Cristina ; Peter, Andreas ; Poettering, Bertram ; Schröder, Dominique (2010):
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Lecture Notes in Computer Science, 6055, In: Applied Cryptography and Network Security (ACNS) 2010, pp. 333-350,
Springer, [Conference or Workshop Item]