default search action
Henrich Christopher Pöhls
Person information
- affiliation: University of Passau, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c55]Noëlle Rakotondravony, Henrich C. Pöhls, Jan Pfeifer, Lane Harrison:
Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks. HCI (46) 2024: 164-185 - [c54]Dennis Eckhardt, Felix C. Freiling, Dominik Herrmann, Stefan Katzenbeisser, Henrich C. Pöhls:
Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme. Sicherheit 2024: 107-118 - [c53]Henrich C. Pöhls, Sven Gebauer, Fabian Scharnböck, Korbinian Spielvogel, Joachim Posegga:
MQfilTTr: Strengthening Smart Home Privacy Through MQTT Traffic Manipulation. WISTP 2024: 17-32 - [c52]Emiliia Gelóczi, Henrich C. Pöhls, Felix Klement, Joachim Posegga, Stefan Katzenbeisser:
Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments. WPES@CCS 2024: 109-123 - 2023
- [j5]Mohsen Shirali, Tobias Tefke, Ralf C. Staudemeyer, Henrich C. Pöhls:
A Survey on Anonymous Communication Systems With a Focus on Dining Cryptographers Networks. IEEE Access 11: 18631-18659 (2023) - [c51]Henrich C. Pöhls:
Towards a Unified Abstract Architecture to Coherently and Generically Describe Security Goals and Risks of AI Systems. STM 2023: 85-94 - 2022
- [c50]Felix Klement, Henrich C. Pöhls, Stefan Katzenbeisser:
Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security. ADIoT 2022: 143-164 - [c49]Felix Klement, Henrich C. Pöhls, Stefan Katzenbeisser:
Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic. CAMAD 2022: 19-25 - [i11]Felix Klement, Henrich C. Pöhls, Stefan Katzenbeisser:
Man-in-the-OBD: A modular, protocol agnostic firewall for automotive dongles to enhance privacy and security. CoRR abs/2210.08281 (2022) - [i10]Mohsen Shirali, Tobias Tefke, Ralf C. Staudemeyer, Henrich C. Pöhls:
A Survey on Anonymous Communication Systems with a Focus on Dining Cryptographers Networks. CoRR abs/2212.08275 (2022) - 2021
- [j4]Florian Menges, Tobias Latzo, Manfred Vielberth, Sabine Sobola, Henrich C. Pöhls, Benjamin Taubmann, Johannes Köstler, Alexander Puchta, Felix C. Freiling, Hans P. Reiser, Günther Pernul:
Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 103: 102165 (2021) - [c48]Korbinian Spielvogel, Henrich C. Pöhls, Joachim Posegga:
TLS Beyond the Broker: Enforcing Fine-Grained Security and Trust in Publish/Subscribe Environments for IoT. STM 2021: 145-162 - [i9]Korbinian Spielvogel, Henrich C. Pöhls, Joachim Posegga:
TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT. CoRR abs/2109.01169 (2021) - 2020
- [j3]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Fully invisible protean signatures schemes. IET Inf. Secur. 14(3): 266-285 (2020) - [c47]Felix Klement, Henrich C. Pöhls, Korbinian Spielvogel:
Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications. GIoTS 2020: 1-6 - [c46]Henrich C. Pöhls, Noëlle Rakotondravony:
Dynamic Consent: Physical Switches and Feedback to Adjust Consent to IoT Data Collection. HCI (23) 2020: 322-335
2010 – 2019
- 2019
- [j2]Ralf C. Staudemeyer, Henrich C. Pöhls, Marcin Wójcik:
What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net. J. Reliab. Intell. Environ. 5(1): 41-64 (2019) - [i8]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Fully Invisible Protean Signatures Schemes. IACR Cryptol. ePrint Arch. 2019: 39 (2019) - 2018
- [b1]Henrich C. Pöhls:
Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures. Passau University, Germany, 2018 - [c45]Thomas Lorünser, Henrich C. Pöhls, Leon Sell, Thomas Laenger:
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle. ARES 2018: 4:1-4:9 - [c44]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. AFRICACRYPT 2018: 11-32 - [c43]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Protean Signature Schemes. CANS 2018: 256-276 - [c42]Leon Sell, Henrich C. Pöhls, Thomas Lorünser:
C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality. CloudCom 2018: 230-238 - [c41]Ralf C. Staudemeyer, Henrich C. Pöhls, Marcin Wójcik:
The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication. WOWMOM 2018: 14-20 - [i7]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Protean Signature Schemes. IACR Cryptol. ePrint Arch. 2018: 970 (2018) - [i6]Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. IACR Cryptol. ePrint Arch. 2018: 971 (2018) - 2017
- [c40]Arne Bilzhause, Henrich C. Pöhls, Kai Samelin:
Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures. ARES 2017: 87:1-87:9 - [c39]Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. ACISP (1) 2017: 437-452 - [c38]Henrich C. Pöhls, Benedikt Petschkuhn:
Towards compactly encoded signed IoT messages. CAMAD 2017: 1-6 - [c37]Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures. Public Key Cryptography (2) 2017: 152-182 - [i5]Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. IACR Cryptol. ePrint Arch. 2017: 11 (2017) - [i4]Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. IACR Cryptol. ePrint Arch. 2017: 445 (2017) - 2016
- [c36]Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls:
PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. ARES 2016: 733-741 - [c35]Arne Bilzhause, Manuel Huber, Henrich C. Pöhls, Kai Samelin:
Cryptographically Enforced Four-Eyes Principle. ARES 2016: 760-767 - [c34]Thomas Länger, Henrich C. Pöhls, Solange Ghernaouti:
Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds. APF 2016: 115-132 - [c33]Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros G. Fragkiadakis:
ECDSA on Things: IoT Integrity Protection in Practise. ICICS 2016: 3-17 - [c32]Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin:
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT. ICICS 2016: 197-213 - [c31]George Moldovan, Elias Z. Tragos, Alexandros G. Fragkiadakis, Henrich C. Pöhls, Daniel Calvo:
An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach. NTMS 2016: 1-5 - [c30]Max Mossinger, Benedikt Petschkuhn, Johannes Bauer, Ralf C. Staudemeyer, Marcin Wójcik, Henrich C. Pöhls:
Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device. WoWMoM 2016: 1-6 - [i3]Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls:
A New Architecture for Developing Cryptographic Cloud Services. ERCIM News 2016(106) (2016) - 2015
- [c29]Henrich Christopher Pöhls, Kai Samelin:
Accountable Redactable Signatures. ARES 2015: 60-69 - [c28]Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu Des Noes, Henrich C. Pöhls, Boris Rozenberg, Daniel Slamanig:
Towards a New Paradigm for Privacy and Security in Cloud Services. CSP Forum 2015: 14-25 - [c27]David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
A General Framework for Redactable Signatures and New Constructions. ICISC 2015: 3-19 - [c26]Henrich C. Pöhls:
JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application. IMIS 2015: 306-312 - [c25]David Derler, Christian Hanser, Henrich C. Pöhls, Daniel Slamanig:
Towards Authenticity and Privacy Preserving Accountable Workflows. Privacy and Identity Management 2015: 170-186 - [i2]Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu Des Noes, Henrich Christopher Pöhls, Boris Rozenberg, Daniel Slamanig:
Towards a New Paradigm for Privacy and Security in Cloud Services. CoRR abs/1506.05980 (2015) - [i1]David Derler, Henrich Christopher Pöhls, Kai Samelin, Daniel Slamanig:
A General Framework for Redactable Signatures and New Constructions. IACR Cryptol. ePrint Arch. 2015: 1059 (2015) - 2014
- [c24]Henrich Christopher Pöhls, Kai Samelin:
On Updatable Redactable Signatures. ACNS 2014: 457-475 - [c23]Henrich C. Pöhls, Max Mossinger, Benedikt Petschkuhn, Johannes Rückert:
Aggregation and perturbation in practice: Case-study of privacy, accuracy & performance. CAMAD 2014: 183-187 - [c22]Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin:
On the Relation between Redactable and Sanitizable Signature Schemes. ESSoS 2014: 113-130 - [c21]Elias Z. Tragos, Vangelis Angelakis, Alexandros G. Fragkiadakis, David Gundlegård, Septimiu-Cosmin Nechifor, George C. Oikonomou, Henrich C. Pöhls, Anastasius Gavras:
Enabling reliable and secure IoT-based smart city applications. PerCom Workshops 2014: 111-116 - [c20]Henrich Christopher Pöhls, Markus Karwe:
Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid. SmartGridSec 2014: 79-93 - [c19]Henrich C. Pöhls, Vangelis Angelakis, Santiago Suppan, Kai Fischer, George C. Oikonomou, Elias Z. Tragos, Rodrigo Diaz Rodriguez, Theodoros Mouroutis:
RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects. WCNC Workshops 2014: 122-127 - 2013
- [c18]Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin:
Scope of Security Properties of Sanitizable Signatures Revisited. ARES 2013: 188-197 - [c17]Christina Brzuska, Henrich Christopher Pöhls, Kai Samelin:
Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures. EuroPKI 2013: 12-30 - [c16]Henrich Christopher Pöhls:
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity. IFIPTM 2013: 136-150 - [c15]Henrich Christopher Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann de Meer:
Malleable Signatures for Resource Constrained Platforms. WISTP 2013: 18-33 - 2012
- [j1]Focke Höhne, Henrich Christopher Pöhls, Kai Samelin:
Rechtsfolgen editierbarer Signaturen. Datenschutz und Datensicherheit 36(7): 485-491 (2012) - [c14]Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer:
On Structural Signatures for Tree Data Structures. ACNS 2012: 171-187 - [c13]Christina Brzuska, Henrich Christopher Pöhls, Kai Samelin:
Non-interactive Public Accountability for Sanitizable Signatures. EuroPKI 2012: 178-193 - [c12]Hermann de Meer, Henrich C. Pöhls, Joachim Posegga, Kai Samelin:
Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions. ICETE (Selected Papers) 2012: 155-171 - [c11]Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer:
Redactable Signatures for Independent Removal of Structure and Content. ISPEC 2012: 17-33 - [c10]Henrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga:
Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction. SECRYPT 2012: 113-125 - [e1]Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga:
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings. Lecture Notes in Computer Science 7322, Springer 2012, ISBN 978-3-642-30954-0 [contents] - 2011
- [c9]Henrich Christopher Pöhls, Kai Samelin, Joachim Posegga:
Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency. ACNS 2011: 166-182 - [c8]Henrich Christopher Pöhls, Arne Bilzhause, Kai Samelin, Joachim Posegga:
Sanitizable signed privacy preferences for social networks. GI-Jahrestagung 2011: 409 - [c7]Henrich Christopher Pöhls, Focke Höhne:
The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes. STM 2011: 175-192 - 2010
- [c6]Ralph Herkenhöner, Hermann de Meer, Meiko Jensen, Henrich Christopher Pöhls:
Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions. SERVICES 2010: 645-652 - [c5]Henrich Christopher Pöhls:
Why Showing One TLS Certificate is not Enough - Towards a Browser Feedback for Multiple TLS Certificate Verifications. Sicherheit 2010: 265-276
2000 – 2009
- 2008
- [c4]Bastian Braun, Henrich Christopher Pöhls:
Authenticity: The missing link in the social semantic web. GI Jahrestagung (2) 2008: 943-948 - [c3]Henrich Christopher Pöhls:
Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. ICICS 2008: 279-293 - [c2]Henrich Christopher Pöhls:
ConCert: Content Revocation Using Certificates. Sicherheit 2008: 149-162 - 2006
- [c1]Henrich Christopher Pöhls, Joachim Posegga:
Smartcard Firewalls Revisited. CARDIS 2006: 179-191
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint