-
2
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
BONATTI, P. A., AND SAMARATI, P. A uniform framework for regulating service access and information release on the web. J. Comput. Secur. 10, 3 (2002), 241-271.
-
(2002)
J. Comput. Secur.
, vol.10
, Issue.3
, pp. 241-271
-
-
Bonatti, P.A.1
Samarati, P.2
-
3
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
EUROCRYPT 2000, Springer Verlag
-
BOUDOT, F. Efficient proofs that a committed number lies in an interval. In EUROCRYPT 2000, vol. 1807 of LNCS, Springer Verlag, pp. 431-444.
-
LNCS
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
4
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
EUROCRYPT'97, Springer Verlag
-
BRANDS, S. Rapid demonstration of linear relations connected by boolean operators. In EUROCRYPT'97, vol. 1233 of LNCS, Springer Verlag, pp. 318-333.
-
LNCS
, vol.1233
, pp. 318-333
-
-
Brands, S.1
-
5
-
-
33745852669
-
Group signatures: Better efficiency and new theoretical aspects
-
LNCS, Springer Verlag
-
CAMENISCH, J., AND GROTH, J. Group signatures: Better efficiency and new theoretical aspects. In SCN 2004, pp. 120-133. LNCS, Springer Verlag.
-
SCN 2004
, pp. 120-133
-
-
Camenisch, J.1
Groth, J.2
-
6
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
EUROCRYPT 2001, Springer Verlag
-
CAMENISCH, J., AND LYSYANSKAYA, A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In EUROCRYPT 2001, vol. 2045 of LNCS, Springer Verlag, pp. 93-118.
-
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
35248839965
-
A signature scheme with efficient protocols
-
SCN 2002, Springer Verlag
-
CAMENISCH, J., AND LYSYANSKAYA, A. A signature scheme with efficient protocols. In SCN 2002, vol. 2576 of LNCS, Springer Verlag, pp. 274-295.
-
LNCS
, vol.2576
, pp. 274-295
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
8
-
-
24944577209
-
Signature schemes and anonymous credentials from bilinear maps
-
LNCS, Springer Verlag
-
CAMENISCH, J., AND LYSYANSKAYA, A. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO 2004, LNCS, Springer Verlag.
-
CRYPTO 2004
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
84957610863
-
Proving in zero-knowledge that a number n is the product of two safe primes
-
EUROCRYPT '99
-
CAMENISCH, J., AND MICHELS, M. Proving in zero-knowledge that a number n is the product of two safe primes. In EUROCRYPT '99, vol. 1592 of LNCS.
-
LNCS
, vol.1592
-
-
Camenisch, J.1
Michels, M.2
-
10
-
-
84921060028
-
Separability and efficiency for generic group signature schemes
-
CRYPTO '99, Springer Verlag
-
CAMENISCH, J., AND MICHELS, M. Separability and efficiency for generic group signature schemes. In CRYPTO '99, vol. 1666 of LNCS, Springer Verlag, pp. 413-430.
-
LNCS
, vol.1666
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
11
-
-
14844283355
-
Practical verifiable encryption and decryption of discrete logarithms
-
LNCS. Springer Verlag
-
CAMENISCH, J., AND SHOUP, V. Practical verifiable encryption and decryption of discrete logarithms. In CRYPTO 2003, LNCS. Springer Verlag.
-
CRYPTO 2003
-
-
Camenisch, J.1
Shoup, V.2
-
12
-
-
33749000965
-
A general certification framework with applications to privacy-enhancing certificate infrastructures
-
IBM Research, July
-
CAMENISCH, J., SOMMER, D., AND ZIMMERMANN, R. A general certification framework with applications to privacy-enhancing certificate infrastructures. Tech. Rep. RZ 3629, IBM Research, July 2005.
-
(2005)
Tech. Rep.
, vol.RZ 3629
-
-
Camenisch, J.1
Sommer, D.2
Zimmermann, R.3
-
13
-
-
84957661460
-
Easy come - Easy go divisible cash
-
EUROCRYPT'98, Springer Verlag
-
CHAN, A., FRANKEL, Y., AND TSIOUNIS, Y. Easy come - easy go divisible cash. In EUROCRYPT'98, vol. 1403 of LNCS, Springer Verlag, pp. 561-575.
-
LNCS
, vol.1403
, pp. 561-575
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
14
-
-
85001025766
-
Wallet databases with observers
-
CRYPTO '92, Springer-Verlag
-
CHAUM, D., AND PEDERSEN, T. P. Wallet databases with observers. In CRYPTO '92, vol. 740 of LNCS, Springer-Verlag, pp. 89-105.
-
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
15
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
CRYPTO '94, Springer Verlag
-
CRAMER, R., DAMGÅRD, I., AND SCHOENMAKERS, B. Proofs of partial knowledge and simplified design of witness hiding protocols. In CRYPTO '94, vol. 839 of LNCS, Springer Verlag, pp. 174-187.
-
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
16
-
-
84948970500
-
Efficient concurrent zero-knowledge in the auxiliary string model
-
EUROCRYPT 2000, Springer Verlag
-
DAMGÅRD, I. Efficient concurrent zero-knowledge in the auxiliary string model. In EUROCRYPT 2000, vol. 1807 of LNCS, Springer Verlag, pp. 431-444.
-
LNCS
, vol.1807
, pp. 431-444
-
-
Damgård, I.1
-
17
-
-
23044533897
-
An integer commitment scheme based on groups with hidden order
-
ASIACRYPT 2002
-
DAMGÅRD, I., AND FUJISAKI, E. An integer commitment scheme based on groups with hidden order. In ASIACRYPT 2002, vol. 2501 of LNCS.
-
LNCS
, vol.2501
-
-
Damgård, I.1
Fujisaki, E.2
-
18
-
-
0000244582
-
Threshold cryptography
-
CRYPTO '89
-
DESMEDT, Y., AND FRANKEL, Y. Threshold cryptography. In CRYPTO '89, vol. 435 of LNCS, pp. 307-315.
-
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
19
-
-
79957729771
-
Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
EUROPEAN PARLIAMENT. Directive 95/46/ec on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities 31 (1995).
-
(1995)
Official Journal of the European Communities
, vol.31
-
-
-
20
-
-
0038150613
-
An Internet attribute certificate profile for authorization
-
(Proposed Standard), Apr.
-
FARRELL, S., AND HOUSLEY, R. An Internet Attribute Certificate Profile for Authorization. RFC 3281 (Proposed Standard), Apr. 2002.
-
(2002)
RFC
, vol.3281
-
-
Farrell, S.1
Housley, R.2
-
21
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
CRYPTO '97
-
FUJISAKI, E., AND OKAMOTO, T. Statistical zero knowledge protocols to prove modular polynomial relations. In CRYPTO '97, vol. 1294 of LNCS, pp. 16-30.
-
LNCS
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
22
-
-
0021941417
-
The knowledge complexity of interactive proof systems
-
GOLDWASSER, S., MICALI, S., AND RACKOFF, C. The knowledge complexity of interactive proof systems. In FOCS 1985, pp. 291-304.
-
FOCS 1985
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
23
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
-
(Proposed Standard), Apr.
-
HOUSLEY, R., POLK, W., FORD, W., AND SOLO, D. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), Apr. 2002.
-
(2002)
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
25
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
CRYPTO '91, Springer Verlag
-
PEDERSEN, T. P. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '91, vol. 576 of LNCS, Springer Verlag, pp. 129-140.
-
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
26
-
-
77953565379
-
-
Whitepaper, 18 July
-
Prime whitepaper. Whitepaper, 18 July 2005. http://www.prime-project.eu. org/prime/public/press_room/whitepaper/PRIME-Whitepaper-V1.pdf.
-
(2005)
Prime Whitepaper
-
-
-
27
-
-
33748992110
-
-
June. Personal communication
-
SAMARATI, P., June 2005. Personal communication.
-
(2005)
-
-
Samarati, P.1
-
28
-
-
84958950087
-
On monotone formula closure of SZK
-
IEEE
-
SANTIS, A. D., CRESCENZO, G. D., PERSIANO, G., AND YUNG, M. On monotone formula closure of SZK. In FOCS 1994, IEEE, pp. 454-465.
-
FOCS 1994
, pp. 454-465
-
-
Santis, A.D.1
Crescenzo, G.D.2
Persiano, G.3
Yung, M.4
-
29
-
-
12344258539
-
Efficient signature generation for smart cards
-
SCHNORR, C. P. Efficient signature generation for smart cards. Journal of Cryptology 4, 3 (1991), 239-252.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
30
-
-
0034449542
-
Prunes: An efficient and complete strategy for automated trust negotiation over the internet
-
ACM Press
-
Yu, T., MA, X., AND WINSLETT, M. Prunes: an efficient and complete strategy for automated trust negotiation over the internet. In ACM CCS'00, ACM Press, pp. 210-219.
-
ACM CCS'00
, pp. 210-219
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
-
31
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
Yu, T., WINSLETT, M., AND SEAMONS, K. E. Interoperable strategies in automated trust negotiation. In ACM CCS '01, pp. 146-155.
-
ACM CCS '01
, pp. 146-155
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
32
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Yu, T., WINSLETT, M., AND SEAMONS, K. E. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6, 1 (2003), 1-42.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|