| Publication | Date of Publication | Type |
|---|
| Selective delegation of attributes in mercurial signature credentials | 2024-08-30 | Paper |
| Identity confidentiality in 5G mobile telephony systems | 2023-10-16 | Paper |
| Strong post-compromise secure proxy re-encryption | 2020-05-27 | Paper |
| Efficient, XOR-based, ideal \((t,n)\)-threshold schemes | 2018-10-26 | Paper |
| Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme | 2017-08-04 | Paper |
| Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes | 2017-07-27 | Paper |
| Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks | 2017-07-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5268510 | 2017-06-20 | Paper |
| Localised multisecret sharing | 2017-04-03 | Paper |
| Graph-theoretic design and analysis of key predistribution schemes | 2016-08-31 | Paper |
| Extended Functionality in Verifiable Searchable Encryption | 2016-04-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3464681 | 2016-01-27 | Paper |
| A Combinatorial Model of Interference in Frequency Hopping Schemes | 2015-08-11 | Paper |
| An application-oriented framework for wireless sensor network key establishment | 2013-12-06 | Paper |
| On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks | 2012-10-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5388555 | 2012-04-18 | Paper |
| Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures | 2012-02-21 | Paper |
| The rise and fall and rise of combinatorial key predistribution | 2011-03-15 | Paper |
| On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks | 2009-07-23 | Paper |
| Efficient Key Predistribution for Grid-Based Wireless Sensor Networks | 2009-01-09 | Paper |
| Key Refreshing in Wireless Sensor Networks | 2009-01-09 | Paper |
| Updating the Parameters of a Threshold Scheme by Minimal Broadcast | 2008-12-21 | Paper |
| The combinatorics of generalised cumulative arrays | 2008-02-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5421815 | 2007-10-24 | Paper |
| Optimal updating of ideal threshold schemes | 2006-12-05 | Paper |
| Distributing the encryption and decryption of a block cipher | 2005-11-07 | Paper |
| A general approach to robust web metering | 2005-08-17 | Paper |
| Geometrical contributions to secret sharing theory | 2004-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4412961 | 2003-07-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413328 | 2003-07-17 | Paper |
| Providing anonymity in unconditionally secure secret sharing schemes | 2003-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4239591 | 2002-01-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2757242 | 2001-11-25 | Paper |
| A general decomposition construction for incomplete secret sharing schemes | 2001-09-18 | Paper |
| Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures | 2000-07-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4269754 | 1999-11-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250638 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4228220 | 1999-05-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3126447 | 1999-05-05 | Paper |
| Mutually trusted authority-free secret sharing schemes | 1998-11-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4400584 | 1998-08-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373624 | 1998-06-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4379737 | 1998-03-30 | Paper |
| Secret sharing in hierarchical groups | 1998-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341671 | 1997-09-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5284662 | 1997-07-06 | Paper |
| Ideal secret sharing schemes with multiple secrets | 1997-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341738 | 1997-06-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341778 | 1997-06-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5284641 | 1997-05-26 | Paper |
| Perfect secret sharing schemes on five participants | 1997-03-23 | Paper |
| A construction for multisecret threshold schemes | 1997-03-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4853712 | 1995-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4322858 | 1995-06-22 | Paper |
| Geometric secret sharing schemes and their duals | 1994-09-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4288075 | 1994-04-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4024337 | 1993-03-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5202143 | 1990-01-01 | Paper |