| Publication | Date of Publication | Type |
|---|
| Output feedback stabilization of large-scale networked cyberphysical systems using cryptographic techniques | 2023-08-31 | Paper |
| Provenance based classification access policy system based on encrypted search for cloud data storage | 2018-10-18 | Paper |
| A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks | 2017-05-16 | Paper |
| Secure administration of cryptographic role-based access control for large-scale cloud storage systems | 2014-07-29 | Paper |
| Trust enhanced distributed authorisation for web services | 2014-04-01 | Paper |
| Membership encryption and its applications | 2013-06-28 | Paper |
| A pre-computable signature scheme with efficient verification for RFID | 2012-06-29 | Paper |
| A logic model for temporal authorization delegation with negation | 2010-02-09 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5692353 | 2005-09-28 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Distributed Computing - IWDC 2004 | 2005-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4829342 | 2004-11-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046839 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4473636 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4473583 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4458135 | 2004-03-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4432462 | 2004-03-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4428349 | 2003-09-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4412995 | 2003-07-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4412985 | 2003-07-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4412986 | 2003-07-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4788578 | 2003-05-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149724 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4501478 | 2002-07-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4530839 | 2002-06-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945385 | 2002-04-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945374 | 2002-03-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2768655 | 2002-02-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2762899 | 2002-01-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409353 | 2002-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2721165 | 2001-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707602 | 2001-04-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4501486 | 2001-03-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502501 | 2001-01-04 | Paper |
| Public key cryptosystems based on boolean permutations and their applications | 2000-11-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4501510 | 2000-09-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945042 | 2000-08-24 | Paper |
| On the design of efficient RSA-based off-line electronic cash schemes | 2000-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4495079 | 2000-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4251031 | 1999-11-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250633 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250645 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250647 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3839186 | 1998-08-13 | Paper |
| A language for specifying sequences of authorization transformations and its applications | 1998-02-10 | Paper |
| Cryptosystems based on permutation polynomials | 1988-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3734300 | 1986-01-01 | Paper |
| Use of trapdoor structures in cryptography | 1986-01-01 | Paper |
| EXTENSION OF RSA CRYPTOSYSTEMS TO MATRIX RINGS | 1985-01-01 | Paper |