Securing proof-of-stake blockchain protocols W Li, S Andreina, JM Bohli, G Karame Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2017 | 374 | 2017 |
A privacy model for smart metering JM Bohli, C Sorge, O Ugus 2010 IEEE International Conference on Communications Workshops, 1-5, 2010 | 286 | 2010 |
Security and privacy-enhancing multicloud architectures JM Bohli, N Gruschka, M Jensen, LL Iacono, N Marnau IEEE Transactions on dependable and secure computing 10 (4), 212-224, 2013 | 219 | 2013 |
Outsourced proofs of retrievability F Armknecht, JM Bohli, GO Karame, Z Liu, CA Reuter Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 192 | 2014 |
Bingo voting: Secure and coercion-free voting using a trusted random number generator JM Bohli, J Müller-Quade, S Röhrich E-Voting and Identity: First International Conference, VOTE-ID 2007, Bochum …, 2007 | 142 | 2007 |
Rpids: Raspberry pi ids—a fruitful intrusion detection system for iot A Sforzin, FG Mármol, M Conti, JM Bohli 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016 | 141 | 2016 |
Transparent data deduplication in the cloud F Armknecht, JM Bohli, GO Karame, F Youssef Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 125 | 2015 |
Secure group key establishment revisited JM Bohli, MI González Vasco, R Steinwandt International Journal of Information Security 6, 243-254, 2007 | 108 | 2007 |
Initial observations on economics, pricing, and penetration of the internet of things market JM Bohli, C Sorge, D Westhoff ACM SIGCOMM Computer Communication Review 39 (2), 50-55, 2009 | 96 | 2009 |
Security prospects through cloud computing by adopting multiple clouds M Jensen, J Schwenk, JM Bohli, N Gruschka, LL Iacono 2011 IEEE 4th international conference on cloud computing, 565-572, 2011 | 87 | 2011 |
SMARTIE project: Secure IoT data management for smart cities JM Bohli, A Skarmeta, MV Moreno, D García, P Langendörfer 2015 international conference on recent advances in Internet of Things (RIoT …, 2015 | 79 | 2015 |
Mirror: Enabling proofs of data replication and retrievability in the cloud F Armknecht, L Barman, JM Bohli, GO Karame 25th USENIX security symposium (USENIX security 16), 1051-1068, 2016 | 68 | 2016 |
Method and system for providing a robust blockchain with an integrated proof of storage JM Bohli, W Li, G Karame, F Armknecht US Patent 10,397,328, 2019 | 66 | 2019 |
A secure and resilient WSN roadside architecture for intelligent transport systems JM Bohli, A Hessler, O Ugus, D Westhoff Proceedings of the first ACM conference on Wireless network security, 161-171, 2008 | 63 | 2008 |
(Password) authenticated key establishment: From 2-party to group M Abdalla, JM Bohli, MIG Vasco, R Steinwandt Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007 | 54 | 2007 |
Relations among privacy notions JM Bohli, A Pashalidis ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-24, 2011 | 52 | 2011 |
Pots: A secure proof of tee-stake for permissionless blockchains S Andreina, JM Bohli, GO Karame, W Li, GA Marson IEEE Transactions on Services Computing 15 (4), 2173-2187, 2020 | 43 | 2020 |
A framework for robust group key agreement JM Bohli International Conference on Computational Science and Its Applications, 355-364, 2006 | 40 | 2006 |
A ROM-friendly secure code update mechanism for WSNs using a stateful-verifier τ-time signature scheme O Ugus, D Westhoff, JM Bohli Proceedings of the second ACM conference on Wireless network security, 29-40, 2009 | 38 | 2009 |
Method for storing data on a storage entity JM Bohli, G Karame, F Armknecht US Patent 11,048,805, 2021 | 35 | 2021 |