default search action
Dieter Sommer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [i1]Stephan Krenn, Kai Samelin, Dieter Sommer:
Stronger Security for Sanitizable Signatures. IACR Cryptol. ePrint Arch. 2018: 858 (2018) - 2015
- [c14]Stefan Thaler, Jerry den Hartog, Dhouha Ayed, Dieter Sommer, Michael Hitchens:
Cross-Domain Attribute Conversion for Authentication and Authorization. ARES 2015: 652-659 - [c13]Stephan Krenn, Kai Samelin, Dieter Sommer:
Stronger Security for Sanitizable Signatures. DPM/QASA@ESORICS 2015: 100-117 - 2014
- [b1]Dieter Sommer:
Privacy-enhanced identity management: from cryptography to practice. Darmstadt University of Technology, Germany, 2014, pp. 1-339 - 2012
- [c12]Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer:
Data-Minimizing Authentication Goes Mobile. Communications and Multimedia Security 2012: 55-71 - [c11]Patrik Bichsel, Jan Camenisch, Dieter Sommer:
A calculus for privacy-friendly authentication. SACMAT 2012: 157-166 - 2011
- [p3]Stephen Crane, Siani Pearson, Dieter Sommer:
Introduction: Privacy, Trust, and Identity Management. Digital Privacy - PRIME 2011: 141-149 - [p2]Dieter Sommer:
Architecture. Digital Privacy - PRIME 2011: 151-288 - [p1]Jan Camenisch, Markulf Kohlweiss, Dieter Sommer:
Pseudonyms and Private Credentials. Digital Privacy - PRIME 2011: 289-308 - [e1]Jan Camenisch, Ronald Leenes, Dieter Sommer:
Digital Privacy - PRIME - Privacy and Identity Management for Europe. Lecture Notes in Computer Science 6545, Springer 2011, ISBN 978-3-642-19049-0 [contents] - 2010
- [j2]Claudio A. Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio:
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project. J. Comput. Secur. 18(1): 123-160 (2010) - [c10]Jan Camenisch, Sebastian Mödersheim, Dieter Sommer:
A Formal Model of Identity Mixer. FMICS 2010: 198-214 - [c9]Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer:
A card requirements language enabling privacy-preserving access control. SACMAT 2010: 119-128
2000 – 2009
- 2009
- [c8]Patrik Bichsel, Samuel Müller, Franz-Stefan Preiss, Dieter Sommer, Mario Verdicchio:
Security and Trust through Electronic Social Network-Based Interactions. CSE (4) 2009: 1002-1007 - 2007
- [j1]Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross, Dieter Sommer:
User centricity: A taxonomy and open issues. J. Comput. Secur. 15(5): 493-527 (2007) - 2006
- [c7]Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross, Dieter Sommer:
User centricity: a taxonomy and open issues. Digital Identity Management 2006: 1-10 - [c6]Jan Camenisch, Abhi Shelat, Dieter Sommer, Roger Zimmermann:
Securing user inputs for the web. Digital Identity Management 2006: 33-44 - [c5]Jan Camenisch, Dieter Sommer, Roger Zimmermann:
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. SEC 2006: 25-37 - [c4]Jan Camenisch, Thomas Gross, Dieter Sommer:
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. WPES 2006: 67-72 - 2005
- [c3]Jan Camenisch, Abhi Shelat, Dieter Sommer, Simone Fischer-Hübner, Marit Hansen, Henry Krasemann, Gérard Lacoste, Ronald Leenes, Jimmy C. Tseng:
Privacy and identity management for everyone. Digital Identity Management 2005: 20-27 - [c2]Michael Backes, Jan Camenisch, Dieter Sommer:
Anonymous yet accountable access control. WPES 2005: 40-46 - 2001
- [c1]Patrick Horster, Martin Schaffer, Peter Schartner, Dieter Sommer:
Secure Internet Phone. Communications and Multimedia Security 2001
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint