-
1
-
-
0011255177
-
Internet X509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile
-
Network Working Group
-
Housley, R., Polk, W., Ford, W., Solo, D.: Internet X509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile. Network Working Group, RFC 3280 (2002)
-
(2002)
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
2
-
-
84958950087
-
On Monotone Formula Closure of SZK
-
De Santis, A., Di Crescenzo, G., Persiano, G., Yung, M.: On Monotone Formula Closure of SZK. In: Proceedings of the 35th Symposium on Foundations of Computer Science, (FOCS'94). (1994) 454-465
-
(1994)
Proceedings of the 35th Symposium on Foundations of Computer Science, (FOCS'94)
, pp. 454-465
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
Yung, M.4
-
3
-
-
0032218230
-
Communication-Efficient Anonymous Group Identification
-
ACM
-
De Santis, A., Di Crescenzo, G., Persiano, P.: Communication-Efficient Anonymous Group Identification. In: Procedings of the 5th ACM Conference on Computer and Communications Security, ACM (1998) 73-82
-
(1998)
Procedings of the 5th ACM Conference on Computer and Communications Security
, pp. 73-82
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, P.3
-
5
-
-
84957366640
-
Rapid Demonstration of Linear Relations Connected by Boolean Operators
-
Fumy, W., ed.: Advances in Cryptology - Eurocrypt '97. Springer-Verlag
-
Brands, S.: Rapid Demonstration of Linear Relations Connected by Boolean Operators. In Fumy, W., ed.: Advances in Cryptology - Eurocrypt '97. Volume 1223 of Lecture Notes in Computer Science., Springer-Verlag (1997) 318-333
-
(1997)
Lecture Notes in Computer Science
, vol.1223
, pp. 318-333
-
-
Brands, S.1
-
6
-
-
79251590715
-
A Secure and Privacy-Protecting Protocol for Transmitting Personal Information between organizations
-
Advances in Cryptology - Crypto'86. Springer-Verlag
-
Chaum, D., Evertse, J.: A Secure and Privacy-Protecting Protocol for Transmitting Personal Information between organizations. In: Advances in Cryptology - Crypto'86. Volume 263 of Lecture Notes in Computer Science., Springer-Verlag (1987) 118-167
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.2
-
7
-
-
67651053584
-
Pseudonym Systems
-
Proceedings of Selected Areas in Cryptography. Springer-Verlag
-
Lysyanskaya, A., Rivest, R., Sahai, A., Wolf, S.: Pseudonym Systems. In: Proceedings of Selected Areas in Cryptography. Volume 1758 of Lecture Notes in Computer Science., Springer-Verlag (1999) 184-199
-
(1999)
Lecture Notes in Computer Science
, vol.1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
8
-
-
84955571224
-
Access with Pseudonyms
-
Cryptography: Policy and Algorithms. Springer-Verlag
-
Chen, L.: Access with Pseudonyms. In: Cryptography: Policy and Algorithms. Volume 1029 of Lecture Notes in Computer Science., Springer-Verlag (1995) 232-243
-
(1995)
Lecture Notes in Computer Science
, vol.1029
, pp. 232-243
-
-
Chen, L.1
-
9
-
-
84945135810
-
An Efficient Non-Transferable Anonymous Multi-Show Credential System with Optional Anonymity Revocation
-
Advances in Cryptology - Eurocrypt '01. Springer-Verlag
-
Camenisch, J., Lysyanskaya, A.: An Efficient Non-Transferable Anonymous Multi-Show Credential System with Optional Anonymity Revocation. In: Advances in Cryptology - Eurocrypt '01. Volume 2656 of Lecture Notes in Computer Science., Springer-Verlag (2001) 93-118
-
(2001)
Lecture Notes in Computer Science
, vol.2656
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
84946849368
-
Self-Blindable Credential Certificates from the Weil Pairing
-
Boyd, C., ed.: Advances in Cryptology - Asiacrypt '01. Springer-Verlag
-
Verheul, E.: Self-Blindable Credential Certificates from the Weil Pairing. In Boyd, C., ed.: Advances in Cryptology - Asiacrypt '01. Volume 2248 of Lecture Notes in Computer Science., Springer-Verlag (2001) 533-551
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 533-551
-
-
Verheul, E.1
-
11
-
-
63449142665
-
An Anonymous Credential System and a Privacy-Aware PKI
-
Proceedings of the 8th Australasian Conference on Information Security and Privacy, (ACISP '03). Springer-Verlag
-
Persiano, P., Visconti, I.: An Anonymous Credential System and a Privacy-Aware PKI. In: Proceedings of the 8th Australasian Conference on Information Security and Privacy, (ACISP '03). Volume 2727 of Lecture Notes in Computer Science., Springer-Verlag (2003) 27-38
-
(2003)
Lecture Notes in Computer Science
, vol.2727
, pp. 27-38
-
-
Persiano, P.1
Visconti, I.2
-
12
-
-
84921023488
-
Some Open Issues and New Directions in Group Signatures
-
Franklin, M., ed.: Financial Cryptography. Springer-Verlag
-
Ateniese, G., Tsudik, G.: Some Open Issues and New Directions in Group Signatures. In Franklin, M., ed.: Financial Cryptography. Volume 1648 of Lecture Notes in Computer Science., Springer-Verlag (1999) 196-211
-
(1999)
Lecture Notes in Computer Science
, vol.1648
, pp. 196-211
-
-
Ateniese, G.1
Tsudik, G.2
-
13
-
-
84958612917
-
Efficient Group Signature Schemes for Large Groups
-
Advances in Cryptology - Crypto 97 Springer-Verlag
-
Camenisch, J., Stadler, M.: Efficient Group Signature Schemes for Large Groups. In: Advances in Cryptology - Crypto 97. Volume 1294 of Lecture Notes in Computer Science., Springer-Verlag (1997) 410-424
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
14
-
-
84921018856
-
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
-
Advances in Cryptology - Crypto '00. Springer-Verlag
-
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Advances in Cryptology - Crypto '00. Volume 1880 of Lecture Notes in Computer Science., Springer-Verlag (2000) 255-270
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
16
-
-
0345490609
-
Efficient Group Signatures without Trapdoors
-
Advances in Cryptology - Asiacrypt '03. Springer-Verlag
-
Ateniese, G., De Medeiros, B.: Efficient Group Signatures without Trapdoors. In: Advances in Cryptology - Asiacrypt '03. Lecture Notes in Computer Science, Springer-Verlag (2003) 246-268
-
(2003)
Lecture Notes in Computer Science
, pp. 246-268
-
-
Ateniese, G.1
De Medeiros, B.2
-
17
-
-
84945309966
-
Proofs of Knowledge for Non-Monotone Discrete-Log Formulae and Applications
-
Proceedings of International Security Conference (ISC '02). Springer-Verlag
-
Bresson, E., Stern, J.: Proofs of Knowledge for Non-Monotone Discrete-Log Formulae and Applications. In: Proceedings of International Security Conference (ISC '02). Volume 2433 of Lecture Notes in Computer Science., Springer-Verlag (2002) 272-288
-
(2002)
Lecture Notes in Computer Science
, vol.2433
, pp. 272-288
-
-
Bresson, E.1
Stern, J.2
-
18
-
-
84957610863
-
Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes
-
Advances in Cryptology - Eurocrypt '99. Springer-Verlag
-
Camenisch, J., Michels, M.: Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes. In: Advances in Cryptology - Eurocrypt '99. Volume 1592 of Lecture Notes in Computer Science., Springer-Verlag (1999) 106-121
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 106-121
-
-
Camenisch, J.1
Michels, M.2
|