PGP-Key / PGP-Key (local)
PGP-Fingerprint: 13a2 45ed 4fdc 2a66 f99e 1e29 e98e 021a 937a f4f2
Mastodon: https://infosec.exchange/@henrichpoehls
Henrich C. Pöhls currently is the managing director of the Centre for IT-Security and he is a senior researcher and lectures in IT-Security, i.e General IT-Security as well as Secure AI Systems. In his research he tries to bridge gaps by conducting interdisciplinary work especially in the fields of IT-Security (esp. cryptography), software development and law:
"The more gaps between those worlds get bridged, the more sound (=safe, secure and legally compliant) ICT-enhanced products and digitally-enhanced environments will be."
Besides teaching he collaborated and lead several successful research projects on security and privacy for Cloud (eg. PRISMACLOUD) & IoT (eg. RERUM and SEMIoTICS). Finally, he is also active in national and international standardisation (eg. editor of ISO/IEC standard 23264 on Redaction of authentic data in ISO JTC1/SC27).
SoSe 21
SoSe 20
WiSe 18/19
SoSe 19
WiSe 18/19
SoSe 14
WiSe 10/11
SoSe 10
WiSe 09/10
SoSe 09
WiSe 08/09
H. C. Pöhls and L. Steffens, "Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices" in ICT Systems Security and Privacy Protection - 40th IFIP SEC Conference , Lili Nemec Zlatolas and Kai Rannenberg and Tatjana Welzer and Joaquin Garcia-Alfaro, Eds. Springer, 2025. pp. 49-63.
DOI: https://doi.org/10.1007/978-3-031-92886-4_4
ISBN: 978-3-031-92885-7
File: https://henrich.poehls.com/papers/2025_Poehls-Steffens_BLE-Pairing-Security-CaseStudy_IFIPSEC.pdf
E. Geloczi, N. Mexis, B. Holler, H. C. P\"ohls and S. Katzenbeisser, "IoTCat: A Multidimensional Approach to Categorize IoT Devices in order to Identify a Delegate for Cybersecurity Functions" in Proceedings of the Workshop AIoTS at the Applied Cryptography and Network Security (ACNS) , Springer, 2025.
H. C. Pöhls, F. Kügler, E. Geloczi and F. Klement, "Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT - An In-Depth STRIDE and LINDDUN Analysis of Smart Homes" , Future Internet , vol. 1, no. 1, pp. 77-138, 2025. MDPI.
H. C. Pöhls, D. Eckhardt, N. Feist, S. Pfeiffer, D. Herrmann and S. Katzenbeisser, "The Complexity of Cyber Security in Private and Professional Everyday Life -- An Ethnographic-Informatic Collaborative Approach" in Proceedings of the 27th International Conference on Human-Computer Interaction (HCII 2025) , Moallem, A., Eds. Springer, 2025. pp. 105-124.
DOI: https://doi.org/10.1007/978-3-031-92833-8_7
ISBN: 978-3-031-92832-1
File: https://henrich.poehls.com/papers/2025_Poehls-et-al_CyberSecurity-in-Everyday-Life_HCIint.pdf
H. C. Pöhls, S. Gebauer, F. Scharnböck, K. Spielvogel and J. Posegga, "MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation." in In Proc. of the 14th International Conference on Information Security Theory and Practice (WISTP 2024) , Springer, 2024.
D. Eckhardt, F. Freiling, D. Herrmann, S. Katzenbeisser and H. C. Pöhls, "Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme" in Sicherheit 2024 , Gesellschaft für Informatik e.V., 2024, pp. 107-118.
E. Geloczi, H. C. Pöhls, F. Klement, J. Posegga and S. Katzenbeisser, "Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments" in Proceedings of the 23rd Workshop on Privacy in the Electronic Society (WPES '24) , 2024.
N. Rakotondravony, H. C. Pöhls, J. Pfeifer and L. Harrison, "Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks." in 26th International Conference on Human-Computer Interaction (HCII 2024) , Springer, 2024.
G. Runze, M. Haimerl, M. Hauer, T. Holoyad, O. Obert, H. C. Pöhls, R. Tagiew and J. Ziehn, Ein Werkzeug für eine gemeinsame KI-Terminologie. .... SIGS DATACOM GmbH, 05 2023.
D. Eckhardt, F. Freiling, D. Herrmann, S. Katzenbeisser and H. C. Pöhls, "Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme" , Fakultät für Informatik und Mathematik, Universität Passau, 2023.
Weblink: https://doi.org/10.15475/sidial.2023
H. C. Pöhls, "Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems" , 09 2023. Springer, https://henrich.poehls.com/papers/2023_poehls_abstract-ai-architecture_STM.pdf .
K. Spielvogel, H. C. Pöhls and J. Posegga, "TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT" in Proc. of 17th International Workshop on Security and Trust Management (STM2021) , Springer, 092021. pp. 145-162.
Weblink: https://link.springer.com/chapter/10.1007/978-3-030-91859-0_8
H. C. Pöhls and N. Tiana Lilie Rakotondravony, "Dynamic Consent: Physical switches and feedback to adjust consent to IoT data collection" in Proceedings of the 2nd International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT 2020) held in conjunsction with the 22nd International Conference on Human Computer Interaction (HCII 2020) , Springer, 072020.
S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Fully Invisible Protean Signatures Schemes" , IET Information Security , vol. 14, pp. 266-285, 05 2020. IET, https://doi.org/10.1049/iet-ifs.2019.0141 .
N. Petroulakis, K. Fysarakis, H. C. Pöhls, V. Kulkarni, G. Spanoudakis, A. Bröring, M. Papoutsakis, M. Michalodimitrakis and S. Ioannidis, "Pattern-driven Security, Privacy, Dependability and Interoperability in IoT" in Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection , now publishers inc., 2020, pp. 121-142.
F. Klement, H. C. Pöhls and K. Spielvogel, "Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications" in Global Internet of Things Summit (GIoTS) , 072020.
R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net" , Journal of Reliable Intelligent Environments (JRIE) , vol. 5, no. 1, pp. 41-64, 04 2019. https://doi.org/10.1007/s40860-019-00075-0 .
File: http://henrich.poehls.com/papers/2019_StaudemeyerPoehlsWojcik_BoostIOTPrivacy_JRIE.pdf
L. Sell, H. C. Pöhls and T. Lorünser, "C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality" in Proceedings of the 10th International Conference on Cloud Computing Technology and Science (CLOUDCOM 2018) , IEEE, 2018.
S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications" in Progress in Cryptology (AFRICACRYPT 2018) , Springer, 2018. pp. 11--32.
DOI: https://doi.org/10.1007/978-3-319-89339-6_2
ISBN: 978-3-319-89339-6
T. Lorünser, H. C. Pöhls, L. Sell and T. Länger, "CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle" in Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018) , New York, NY, USA: ACM, 2018. pp. 4:1--4:9.
DOI: https://doi.org/10.1145/3230833.3233765
ISBN: 978-1-4503-6448-5
File: http://henrich.poehls.com/papers/2018_LoruenserPoehlsSellLaenger_CrypSDLC_ARES2018_preprint.pdf
H. C. Pöhls, "Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures", University of Passau, 2018.
File: https://opus4.kobv.de/opus4-uni-passau/files/582/Poehls_Thesis_Final.pdf
S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Protean Signature Schemes" in Proc. of the 17th conference on Cryptology and Network Security (CANS 2018) , Springer, 2018. pp. 256--276.
R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication" in {Proc. of The 7th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2018)} , IEEE, 2018.
File: http://henrich.poehls.com/papers/2018_Staudemeyer-Poehls-Wojcik_road2privacy_preprint.pdf
J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures" in Proc. of 20th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017) , IACR, 2017. pp. 152--182.
DOI: https://eprint.iacr.org/2017/011
File: http://henrich.poehls.com/papers/2017_CDKPSS_chamhash_with_ephemeral_trapdoors_PKC-eprint.pdf
H. C. Pöhls and T. Länger, "Einsetzbare Kryptografie für die Cloud" , Zeitschrift für Datenrecht und Informationssicherheit (digma) , vol. 17, no. 1, pp. 78--81, 2017. Schulthess Juristische Medien.
A. Bilzhause, H. C. Pöhls and K. Samelin, "Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures" in Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloudto be held at the 12th International Conference on Availability, Reliability and Security (ARES SECPID 2017) , Conference Publishing Services (CPS), 2017.
File: http://henrich.poehls.com/papers/2017_BilzhausePoehlsSamelin_ARES17_RSS_SSS_PastPresentFuture.pdf
M. Till Beck, J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures" in Proc. of 22nd Australasian Conference on Information Security and Privacy (ACISP 2017) , Springer, 2017. pp. 437--452.
H. C. Pöhls and B. Petschkuhn, "Towards compactly encoded signed IoT messages" in IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (IEEE CAMAD 2017) , IEEE, 2017.
File: http://henrich.poehls.com/papers/2017_PoehlsPetschkuhn_IoT_signature_encoding_CAMAD.pdf
A. Kung, F. Kargl, S. Suppan, J. Cuellar, H. C. Pöhls, A. Kapovits, N. Notario and Y. Samuel Martin, "A Privacy Engineering Framework for the Internet of Things" in Proc. of 9th edition of the international conference Computers, Privacy and Data Protection 2016 (CDPD 2016) , 2016.
G. Moldovan, E. Z. Tragos, A. Fragkiadakis, H. C. Pöhls and D. Calvo, "An IoT middleware for enhanced security and privacy: the RERUM approach" in Proc. of 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2016) , IEEE, 2016.
A. Bilzhause, M. Huber, H. C. Pöhls and K. Samelin, "Cryptographically Enforced Four-Eyes Principle" in Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloudto be held at the 11th International Conference on Availability, Reliability and Security (ARES SECPID 2016) , Conference Publishing Services (CPS), 2016.
File: http://henrich.poehls.com/papers/2016_BilzhauseHuberPoehlsSamelin_4EyesPrinciple_ARES_SECPID.pdf
E. Z. Tragos, A. Fragkiadakis, V. Angelakis and H. C. Pöhls, "Designing Secure IoT Architectures for Smart City Applications" in Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions , Springer, 2016.
J. Bauer, R. C. Staudemeyer, H. C. Pöhls and A. Fragkiadakis, "ECDSA on things: IoT integrity protection in practise" in Proc. of Information and Communications Security (ICICS 2016) , K.-Y. Lam et al., Eds. Springer, 2016.
File: http://henrich.poehls.com/papers/2016_Bauer-et-al_ECDSA-on-things_ICICS.pdf
C. Frädrich, H. C. Pöhls, W. Popp, N. Rakotondravony and K. Samelin, "Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud and IoT" in Proc. of Information and Communications Security (ICICS 2016) , K.-Y. Lam et al., Eds. Springer, 2016.
File: http://henrich.poehls.com/papers/2016_SelectiveDisclosureControl_ICICS2016_full.pdf
G. Oikonomou, R. C. Staudemeyer, A. Fragkiadakis, M. Wójcik, E. Tragos, G. Papadopoulos, H. C. Pöhls, D. Gundlegard, V. Angelakis, S. Katuri, J. Bauer, B. Petschkuhn, P. Charalampidis, G. Stamatakis, M. Surligas and A. Makrogiannakis, "Laboratory Evaluation Results (RERUM Deliverable D5.2)" , internal report, 2016.
D. Ruiz-López, J. Cuellar, R. C. Staudemeyer, P. Charalampidis, A. Fragkiadakis, P. Kasinathan, H. C. Pöhls, S. Suppan, E. Tragos and R. Weber, "Modelling the trustworthiness of the IoT (RERUM Deliverable D3.3)" , 2016.
T. Lorünser, D. Slamanig, T. Länger and H. C. Pöhls, "PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services" in Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloudto be held at the 11th International Conference on Availability, Reliability and Security (ARES SECPID 2016) , Conference Publishing Services (CPS), 2016.
A. Fragkiadakis, G. Oikonomou, H. C. Pöhls, E. Z. Tragos and M. Wójcik, "Securing Communications Among Severely Constrained, Wireless Embedded Devices" in Engineering Secure Internet of Things Systems , Benjamin Aziz and Alvaro Arenas and Bruno Crispo, Eds. The Institute of Engineering and Technology, 2016.
File: http://www.theiet.org/resources/books/security/secIoT.cfm
R. C. Staudemeyer, H. C. Pöhls and B. W. Watson, "Security & Privacy for the Internet-of-Things communication in the SmartCity" in Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions , Springer, 2016, pp. 28.
T. Länger, H. C. Pöhls and S. Ghernaouti, "Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds" in Privacy Technologies and Policy - 4th Annual Privacy Forum (APF 2016) , Springer, 2016.
D. Derler, C. Hanser, H. C. Pöhls and D. Slamanig, "Towards Authenticity and Privacy Preserving Accountable Workflows" in {Privacy and Identity Management. Time for a Revolution? - Proc. of 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School} , Springer, 2016. pp. 170-186.
DOI: http://www.springer.com/de/book/9783319417622
ISBN: 978-3-319-41762-2
M. Mössinger, B. Petschkuhn, J. Bauer, R. C.Staudemeyer, M. Wójcik and H. C. Pöhls, "Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECCsignatures on an ARM-based device" in {Proc. of The 5th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2016)} , IEEE, 2016.
D. Derler, H. C. Pöhls, K. Samelin and D. Slamanig, "A General Framework for Redactable Signatures and New Constructions" in {Proc. of 18th Annual International Conference on Information Security and Cryptology (ICISC 2015)} , Springer, 2015. pp. 3-19.
DOI: http://link.springer.com/content/pdf/10.1007%2F978-3-319-30840-1_1.pdf
H. C. Pöhls and K. Samelin, "Accountable Redactable Signatures" in Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015) , IEEE, 2015.
File: http://henrich.poehls.com/papers/2015_Poehls-Samelin_Accountable-Redactable-Signatures_ARES15.pdf
D. Ruiz, C. Reyes, A. Fragkiadakis, E. Tragos, V. Siris, A. Traganitis, P. Charalampides, H. C. Pöhls, B. Petschkuhn, J. Bauer, K. Fischer, J. Gessner, S. Suppan, J. Cuellar, M. Wójcik and G. Oikonomou, "Enhancing the autonomous smart objects and the overall system security of IoT based Smart Cities (RERUM Deliverable D3.1)" , internal report, 2015.
G. Baldini, T. Peirce, M. Botterman, M. Chiara Talacchini, A. Pereira, M. Handte, D. Rotondi, H. C. Pöhls, O. Vermesan, A. Baddii, B. Copigneaux, D. Schreckling, L. Vigano, G. Steri, S. Piccione, P. Vlacheas, V. Stavroulaki, D. Kelaidonis, R. Neisse, E. Tragos, P. Smadja, C. Hennebert, M. Serrano, S. Severi, G. Abreu, P. T. Kirstein, S. Varakliotis and A. Skarmeta, Internet of Things -- Governance, Privacy and Security Issues. .... IERC, 2015.
H. C. Pöhls, "JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application" in Proc. of the Workshop on Extending Seamlessly to the Internet of Things (esIoT), collocated at the IMIS-2012 International Conference (IMIS 2015) , IEEE, 2015. pp. 306 - 312.
DOI: http://dx.doi.org/10.1109/IMIS.2015.48
File: http://henrich.poehls.com/papers/2015_Poehls-JSONSensorSignatures_esIoT.pdf
D. Demirel, D. Derler, C. Hanser, H. C. Pöhls, D. Slamanig and G. Traverso, "Overview of Functional and Malleable Signature Schemes (PRISMACLOUD Deliverable D4.4)" , 2015.
File: http://henrich.poehls.com/papers/2015_TechReport_PRISMACLOUD_D_4_4.pdf
TODO
H. C. Pöhls, J. Cuellar, R. Weber, R. C. Staudemeyer, S. Suppan, E. Tragos, A. Fragkiadakis, M. Wójcik, J. Bauer, B. Petschkuhn and D. Ruiz, "Privacy enhancing techniques in Smart City applications (RERUM Deliverable D3.2)" , 2015.
File: https://bscw.ict-rerum.eu/pub/bscw.cgi/d31975/RERUM%20deliverable%20D3_2.pdf
E. Z. Tragos, H. C. Pöhls, R. C. Staudemeyer, D. Slamanig, A. Kapovits, S. Suppan, A. Fragkiadakis, G. Baldini, R. Neisse, P. Langendörfer, Z. Dyka and C. Wittke, "Securing the Internet of Things - Security and Privacy in a Hyperconnected World" in Building the Hyperconnected Society - IoT Research and Innovation Value Chains, Ecosystems and Markets , Ovidiu Vermesan and Peter Friess, Eds. River Publishers, 2015, pp. 189-219.
F. Geelkerken, H. C. Pöhls and S. Fischer-Hübner, "The legal status of malleable- and functional signatures in light of Regulation (EU) No910/2014" in {Proc. of 3rd International Academic Conference of Young Scientists on Law \& Psychology 2015 (LPS 2015)} , L'viv Polytechnic Publishing House, 2015. pp. 404-410.
ISBN: 978-617-607-856-2
File: https://drive.google.com/file/d/0B-Yu3Ni9z3PXM2lBajhCXzhoWk0/view
T. Lorünser, C. Bastos Rodriguez, D. Demirel, S. Fischer-Hübner, T. Gross, T. Länger, M. Noes, H. C. Pöhls, B. Rozenberg and D. Slamanig, "Towards a New Paradigm for Privacy and Security in Cloud Services" in New LEIT projects on Security-by-Design - 4th Cyber Security and Privacy EU Forum, CSP Forum 2015, Brussels, Belgium, April 28 - 29 , Springer, 2015.
H. C. Pöhls, B. Petschkuhn, J. Rückert and M. Mössinger, "Aggregation and Perturbation in Practice: Case-Study of Privacy, Accuracy and Performance" in IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (IEEE CAMAD 2014) , IEEE, 2014.
E. Z. Tragos, V. Angelakis, A. Fragkiadakis, D. Gundlegard, S. Nechifor, G. Oikonomou, H. C. Pöhls and A. Gavras, "Enabling Reliable and Secure IoT-based Smart City Applications" in Proc. of 1st International IEEE Workshop on Pervasive Systems for Smart Cities , IEEE, 2014.
TODO
H. Meer, H. C. Pöhls, J. Posegga and K. Samelin, "On the Relation between Redactable and Sanitizable Signature Schemes" in Proc. of the 6th International Symposium on Engineering Secure Software and Systems (ESSoS 2014) , Jürjens, Jan and Piessens, Frank and Bielova, Nataliia, Eds. Springer International Publishing, 2014. pp. 113-130.
DOI: http://dx.doi.org/10.1007/978-3-319-04897-0_8
ISBN: 978-3-319-04896-3
H. C. Pöhls and K. Samelin, "On Updatable Redactable Signatures" in Proc. of the 12th International Conference on Applied Cryptography and Network Security (ACNS 2014) , Springer, 2014.
DOI: http://link.springer.com/chapter/10.1007/978-3-319-07536-5_27
File: http://henrich.poehls.com/papers/2014_PoehlsSamelin_OnUpdatableRedactableSignatures_ACNS14_full.pdf
[English] H. Meer, H. C. Pöhls, J. Posegga and K. Samelin, "Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions" , vol. 455, pp. 155-171, 2014. Springer Berlin Heidelberg.
DOI: http://dx.doi.org/10.1007/978-3-662-44791-8_10
ISBN: 978-3-662-44790-1
H. C. Pöhls and M. Karwe, "Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid" in Proc. of the 2nd Workshop on Smart Grid Security (SmartGridSec 2014) , Jorge Cuellar, Eds. Springer International Publishing, 2014.
DOI: http://link.springer.com/chapter/10.1007/978-3-319-10329-7_6/fulltext.html
H. C. Pöhls, V. Angelakis, S. Suppan, K. Fischer, G. Oikonomou, E. Z. Tragos, R. Diaz Rodriguez and T. Mouroutis, "RERUM: Building a Reliable IoT upon Privacy- and Security- enabled Smart Objects" in Proc. of the IEEE WCNC 2014 Workshop on Internet of Things Communications and Technologies , IEEE, 2014.
H. C. Pöhls, "Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity" in Trust Management VII , Fernandez-Gago, Carmen and Martinelli, Fabio and Pearson, Siani and Agudo, Isaac, Eds. Springer Berlin Heidelberg, 2013. pp. 136-150.
DOI: http://dx.doi.org/10.1007/978-3-642-38323-6_10
ISBN: 978-3-642-38322-9
File: http://henrich.poehls.com/papers/2013_Poehls_Contingency.pdf
C. Brzuska, H. C. Pöhls and K. Samelin, "Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures" in Proc. of the 10th European Workshop: Public Key Infrastructures, Services and Applications (EuroPKI 2013) , Katsikas, Sokratis and Agudo, Isaac, Eds. Springer Berlin Heidelberg, 2013. pp. 12-30.
DOI: http://dx.doi.org/10.1007/978-3-642-53997-8_2
ISBN: 978-3-642-53996-1
H. C. Pöhls, S. Peters, K. Samelin, J. Posegga and H. Meer, "Malleable Signatures for Resource Constrained Platforms" in Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems , Cavallaro, Lorenzo and Gollmann, Dieter, Eds. Springer-Verlag, 2013. pp. 18-33.
DOI: http://dx.doi.org/10.1007/978-3-642-38530-8_2
ISBN: 978-3-642-38529-2
File: http://henrich.poehls.com/papers/2013_PoehlsPetersSamelinPoseggaDeMeer_WISTP.pdf
H. Meer, H. C. Pöhls, J. Posegga and K. Samelin, "Scope of Security Properties of Sanitizable Signatures Revisited" in Proc. of the 8th International Conference on Availability, Reliability and Security (ARES 2013) , IEEE, 2013. pp. 188-197.
H. C. Pöhls, K. Samelin, J. Posegga and H. Meer, "Flexible Redactable Signature Schemes for Trees --- Extended Security Model and Construction" in Proc. of the International Conference on Security and Cryptography (SECRYPT 2012) , SciTePress, 2012. pp. 113-125.
ISBN: 978-989-8565-24-2
H. Meer, M. Liedel, H. C. Pöhls, J. Posegga and K. Samelin, "Indistinguishability of One-Way Accumulators" , 2012.
File: https://www.fim.uni-passau.de/fileadmin/files/forschung/mip-berichte/MIP_1210.pdf
H. C. Pöhls, K. Samelin, J. Posegga and H. Meer, "Length-Hiding Redactable Signatures from One-Way Accumulators in O(n)" , 2012.
File: http://henrich.poehls.com/papers/2012_Poehls-Samelin-Posegga-deMeer_TechReport_MIP1201.pdf
TODO
C. Brzuska, H. C. Pöhls and K. Samelin, "Non-Interactive Public Accountability for Sanitizable Signatures" in Proc. of the 9th European PKI Workshop: Research and Applications (EuroPKI 2012) , Springer-Verlag, 2012. pp. 178.
K. Samelin, H. C. Pöhls, A. Bilzhause, J. Posegga and H. Meer, "On Structural Signatures for Tree Structured Data" in Proc. of the 10th International Conference on Applied Cryptography and Network Security (ACNS 2012) , Springer, 2012.
DOI: http://link.springer.com/chapter/10.1007/978-3-642-31284-7_11
F. Höhne, H. C. Pöhls and K. Samelin, "Rechtsfolgen editierbarer Signaturen" , Datenschutz und Datenrecht (DuD) , vol. Volume 36, no. 6, pp. 485-491, 2012.
File: http://henrich.poehls.com/papers/2012_HoehnePoehlsSamelin_DuD1207.pdf
K. Samelin, H. C. Pöhls, A. Bilzhause, J. Posegga and H. Meer, "Redactable Signatures for Independent Removal of Structure and Content" in Proc. of the 8th International Conference on Information Security Practice and Experience (ISPEC 2012) , Springer, 2012.
K. Samelin, H. C. Pöhls, J. Posegga and H. Meer, "Redactable vs. Sanitizable Signatures" , 2012.
H. C. Pöhls and F. Höhne, "Sticky Signatures: Legal Advantages of Redactable Signatures and Credentials in the Food Supply Chain" in Proc. of the 5th Interdisciplinary Conference on Current Issues in IT Security 2012 , Dunker \& Humblot, Berlin, 2012.
H. C. Pöhls and F. Höhne, "The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes" in Proc. of 7th International Workshop on Security and Trust Management (STM 2011) , Springer, 2012. pp. 175-192.
H. C. Pöhls, K. Samelin, J. Posegga and H. Meer, "Transparent Mergeable Redactable Signatures with Signer Commitment and Applications" , 2012.
File: http://henrich.poehls.com/papers/2012_Poehls-Samelin-Posegga-deMeer_TechReport_MIP1206.pdf
TODO
H. C. Pöhls, K. Samelin and J. Posegga, "Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency" in Proc. of 9th International Conference on Applied Cryptography and Network Security (ACNS 2011) , Springer, 2011.
H. C. Pöhls, A. Bilzhause, K. Samelin and J. Posegga, "Sanitizable Signed Privacy Preferences for Social Networks" in Proc. of GI Workshop on Privacy and Identity Management for Communities - Communities for Privacy and Identity Management (DICCDI 2011) , GI, 2011.
TODO
F. Höhne and H. C. Pöhls, "Grund und Grenzen staatlicher Schutzpflichten für die IT-Infrastruktur" in Tagungsband der 11. Herbstakademie der Deutschen Stiftung für Recht und Informatik (DSRI): Digitale Evolution - Herausforderungen für das Informations- und Medienrecht , {OlWIR} Oldenburger Verlag für Wirtschaft, Informatik und Recht, 2010.
ISBN: 978-3-939704-50-8
F. Höhne and H. C. Pöhls, "Staatliche Schutzpflichten für die IT-Infrastruktur" in Proc. of D-A-CH Security 2010 , 2010.
TODO
R. Herkenhöner, M. Jensen, H. C. Pöhls and H. Meer, "Towards Automated Processing of the Right of Access in Inter-Organizational Web Service Compositions" in IEEE 2010 International Workshop on WebService and Business Process Security (WSBPS 2010) , IEEE, 2010.
DOI: http://www.computer.org/csdl/proceedings/services/2010/4129/00/4129a645-abs.html
File: http://henrich.poehls.com/papers/2010_Herkenhohner_Poehls_Jensen_AutomatedRightofAccess.pdf
H. C. Pöhls, "Why Showing one TLS Certificate is not enough? Towards a Browser Feedback for Multiple TLS Certificate Verifications" in Proc. of GI Sicherheit 2010 - Gesellschaft für Informatik , GI, 2010.
TODO
B. Braun and H. C. Pöhls, "Authenticity: The missing link in the social semantic web" in INFORMATIK 2008 Beherrschbare Systeme - dank Informatik, Digitale Soziale Netze 2008 , Lecture Notes in Informatics (LNI), Springer, 2008.
DOI: http://subs.emis.de/LNI/Proceedings/Proceedings134/article2208.html
File: http://henrich.poehls.com/papers/2008_braun_poehls_authenticity_missing_link_in_social_networks.pdf
H. C. Pöhls, "ConCert: Content Revocation using Certificates" in GI Sicherheit 2008 - Gesellschaft für Informatik , Jörg Siekmann, Eds. GI, 2008. pp. 149-162.
H. C. Pöhls and L. Westphal, "Die ''Untiefen'' der neuen XML-basierten Dokumentenformate" in 15. DFN CERT Workshop Sicherheit in vernetzten Systemen , Christian Paulsen, Eds. 2008.
H. C. Pöhls, "Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data" in Proc. of Information and Communications Security (ICICS) 2008 , L. Chen, M.D. Ryan, and G. Wang, Eds. Springer, 2008. pp. 279-293.
DOI: http://dx.doi.org/10.1007/978-3-540-88625-9_19
File: http://henrich.poehls.com/papers/2008_Poehls_RevocableExpressionOfConsent_ICICS2008.pdf
TODO
H. C. Pöhls, "Authenticity and Revocation of Web Content using Signed Microformats and PKI" , Hamburg, Germany, 2007.
File: http://henrich.poehls.com/papers/2007_Poehls_TechReport_B-276-07.pdf
H. C. Pöhls and J. Posegga, "Smartcard Firewalls Revisited" in Proc. 7th Intern. Conf. on Smart Card Research and Applications , Tarragona, Spain: Springer Verlag, 2006. pp. 179-191.
File: http://henrich.poehls.com/papers/2006_Poehls_Posegga_SmartcardFirewallsRevisited.pdf
TODO
TODO
TODO