-
2
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
M. Bellare, Bd. Lecture Notes in Computer Science. Springer Verlag, Berlin
-
ATENIESE, G., CAMENISCH, J., JOYE, M., AND TSUDIK, G. 2000. A practical and provably secure coalition-resistant group signature scheme. In Proceedings of Advances in Cryptology - CRYPTO 2000, M. Bellare, Bd. Lecture Notes in Computer Science, vol. 1880. Springer Verlag, Berlin, 255-270.
-
(2000)
Proceedings of Advances in Cryptology - CRYPTO 2000
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
3
-
-
84921023488
-
Some open issues and new directions in group signatures
-
Lecture Notes in Computer Science. Springer Verlag, Berlin
-
ATENIESE, G. AND TSUDIK, G. 1999. Some open issues and new directions in group signatures. In Financial Cryptography. Lecture Notes in Computer Science, vol. 1648. Springer Verlag, Berlin, 196-211.
-
(1999)
Financial Cryptography
, vol.1648
, pp. 196-211
-
-
Ateniese, G.1
Tsudik, G.2
-
5
-
-
84957354154
-
Efficient and generalized group signatures
-
Lecture Notes in Computer Science. Springer Verlag, Berlin
-
CAMENISCH, J. L. 1997. Efficient and generalized group signatures. In Proceedings of Advances in Cryptology - Eurocrypt '97. Lecture Notes in Computer Science, vol. 1233. Springer Verlag, Berlin, 465-479.
-
(1997)
Proceedings of Advances in Cryptology - Eurocrypt '97
, vol.1233
, pp. 465-479
-
-
Camenisch, J.L.1
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the Association for Computing Machinery 24, 2 (Feb.), 84-88.
-
(1981)
Communications of the Association for Computing Machinery
, vol.24
, Issue.2 FEB.
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. Plenum Press, New York
-
CHAUM, D. 1983. Blind signatures for untraceable payments. In Advances in Cryptology: Proceedings of Crypto'82. D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. Plenum Press, New York, 199-203.
-
(1983)
Advances in Cryptology: Proceedings of Crypto'82
, pp. 199-203
-
-
Chaum, D.1
-
8
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
CHAUM, D. 1985. Security without identification: transaction systems to make big brother obsolete. Communications of the Association for Computing Machinery 28, 10, 1030-1044.
-
(1985)
Communications of the Association for Computing Machinery
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
9
-
-
85024290278
-
Group signatures
-
D. W. Davies, Ed. LNCS. Springer, Berlin
-
CHAUM, D. AND VAN HEYST, E. 1991. Group signatures. In Proceedings of Advances in Cryptology (EUROCRYPT '91), D. W. Davies, Ed. LNCS, vol. 547. Springer, Berlin, 257-265.
-
(1991)
Proceedings of Advances in Cryptology (EUROCRYPT '91)
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
10
-
-
0032218230
-
Communication-efficient anonymous group identification
-
ACM Press, San Francisco, CA
-
DE SANTIS, A., DI CRESCENZO, G., AND PERSIANO, G. 1998. Communication-efficient anonymous group identification. In Proceedings of the 5th ACM Conference on Computer and Communications Security. ACM Press, San Francisco, CA, 73-82.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 73-82
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
-
11
-
-
84958950087
-
On monotone formula closure of SZK
-
(Santa Fe, NM, Nov. 20-22, 1994) S. Goldwasser, Ed. IEEE Computer Society Press, Los Alamitos, CA
-
DE SANTIS, A., DI CRESCENZO, G., PERSIANO, G., AND YUNG, M. 1994. On monotone formula closure of SZK. In Proceedings of 35th Annual Symposium on Foundations of Computer Science (Santa Fe, NM, Nov. 20-22, 1994), S. Goldwasser, Ed. IEEE Computer Society Press, Los Alamitos, CA, 454-465.
-
(1994)
Proceedings of 35th Annual Symposium on Foundations of Computer Science
, pp. 454-465
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
Yung, M.4
-
14
-
-
1442357062
-
US secure hash algorithm 1
-
EASTLAKE, D. AND JONES, P. 2001. US secure hash algorithm 1. RFC 3174.
-
(2001)
RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
15
-
-
0024135240
-
Zero-knowledge proofs of identity
-
FEIGE, U., FIAT, A., AND SHAMIR, A. 1988. Zero-knowledge proofs of identity. Journal of Cryptology 1, 2, 77-94.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
16
-
-
0024984004
-
Witness indistinguishable and witness hiding protocols
-
B. Awerbuch, Ed. ACM Press, Baltimore, MD
-
FEIGE, U. AND SHAMIR, A. 1990. Witness indistinguishable and witness hiding protocols. In Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing. B. Awerbuch, Ed. ACM Press, Baltimore, MD, 416-426.
-
(1990)
Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing
, pp. 416-426
-
-
Feige, U.1
Shamir, A.2
-
18
-
-
0024611659
-
The knowledge complexity of interactive systems
-
GOLDWASSER, S., MICALI, S., AND RACKOFF, C. 1989. The knowledge complexity of interactive systems. SIAM Journal of Computing 18, 1, 186-208.
-
(1989)
SIAM Journal of Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
19
-
-
85031542311
-
Mixing e-mail with BABEL
-
Internet Society, IEEE Computer Society Press, San Diego, CA
-
GÜLCÜ, C. AND TSUDIK, G. 1996. Mixing e-mail with BABEL. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '96). Internet Society, IEEE Computer Society Press, San Diego, CA.
-
(1996)
Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '96)
-
-
Gülcü, C.1
Tsudik, G.2
-
20
-
-
0011255177
-
Internet X509 public key infrastructure: Certificate and certificate revocation List (CRL) profile
-
Network Working Group
-
HOUSLEY, R., POLK, W., FORD, W., AND SOLO, D. 2002. Internet X509 public key infrastructure: Certificate and certificate revocation List (CRL) profile. Network Working Group, RFC 3280.
-
(2002)
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
22
-
-
84862388040
-
-
Moz2I 2000. The Moz2I home page. http://www.security.unisa.it/spsl/moz2i. html.
-
(2000)
The Moz2I Home Page
-
-
-
24
-
-
0034449509
-
User privacy issues regarding certificates and the TLS protocol: The design and implementation of the SPSL protocol
-
S. Jajodia and P. Samarati, Eds. ACM Press, New York
-
PERSIANO, P. AND VISCONTI, I. 2000. User privacy issues regarding certificates and the TLS protocol: The design and implementation of the SPSL protocol. In Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-00), S. Jajodia and P. Samarati, Eds. ACM Press, New York, 53-62.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-00)
, pp. 53-62
-
-
Persiano, P.1
Visconti, I.2
-
25
-
-
0032074579
-
Anonymous connections and onion routing
-
REED, M. G., SYVERSON, P. F., AND GOLDSCHLAG, D. M. 1998. Anonymous connections and onion routing. IEEE Journal on Special Areas in Communications 16, 4 (May), 482-494.
-
(1998)
IEEE Journal on Special Areas in Communications
, vol.16
, Issue.4 MAY
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
27
-
-
84946833891
-
How to leak a secret
-
C. Boyd, Ed. Lecture Notes in Computer Science. Springer Verlag, Berlin
-
RIVEST, L., SHAMIR, A., AND TAUMAN, Y. 2001. How to leak a secret. In ASIACRYPT: Advances in Cryptology - ASIACRYPT: International Conference on the Theory and Application of Cryptology, C. Boyd, Ed. Lecture Notes in Computer Science, vol. 2248. Springer Verlag, Berlin, 552-565.
-
(2001)
ASIACRYPT: Advances in Cryptology - ASIACRYPT: International Conference on the Theory and Application of Cryptology
, vol.2248
, pp. 552-565
-
-
Rivest, L.1
Shamir, A.2
Tauman, Y.3
-
29
-
-
84956867779
-
Anonymous authentication of membership in dynamic groups
-
M. Franklin, Ed. Lecture Notes in Computer Science. Springer Verlag, Berlin
-
SCHECHTER, S., PARNELL, T., AND HARTEMINK, A. 1999. Anonymous authentication of membership in dynamic groups. In Proceedings of the 3rd International Conference on Financial Cryptography 99, M. Franklin, Ed. Lecture Notes in Computer Science, vol. 1648. Springer Verlag, Berlin, 184-195.
-
(1999)
Proceedings of the 3rd International Conference on Financial Cryptography 99
, vol.1648
, pp. 184-195
-
-
Schechter, S.1
Parnell, T.2
Hartemink, A.3
-
30
-
-
84862389956
-
-
SPSL. The SPSL home page. http://www.security.unisa.it/spsl.
-
The SPSL Home Page
-
-
-
31
-
-
0005072366
-
Unlinkable serial transactions: Protocols and applications
-
STUBBLEBINE, S. G., SYVERSON, P. F., AND GOLDSCHLAG, D. M. 1999. Unlinkable serial transactions: protocols and applications. ACM Transactions on Information and System Security 2, 4, 354-389.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.4
, pp. 354-389
-
-
Stubblebine, S.G.1
Syverson, P.F.2
Goldschlag, D.M.3
|