-
1
-
-
27444438240
-
Secure e-coupons
-
Blundo, C., Cimato, S., De Bonis, A.: Secure e-coupons. Electronic Commerce Research 5(1), 117-139 (2005)
-
(2005)
Electronic Commerce Research
, vol.5
, Issue.1
, pp. 117-139
-
-
Blundo, C.1
Cimato, S.2
De Bonis, A.3
-
2
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Boudot, F.: Efficient proofs that a committed number lies in an interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431-444. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
3
-
-
2642567163
-
A technical overview of digital credentials
-
February
-
Brands, S.: A technical overview of digital credentials, research report (February 2002), http://www.xs4all.nl/#brands/
-
(2002)
research report
-
-
Brands, S.1
-
4
-
-
24944435537
-
Compact e-cash
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
5
-
-
35248839965
-
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, Springer, Heidelberg (2003)
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, Springer, Heidelberg (2003)
-
-
-
-
6
-
-
33746629749
-
-
Canard, S., Gouget, A., Hufschmitt, E.: A handy multi-coupon system. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 66-81. Springer, Heidelberg (2006)
-
Canard, S., Gouget, A., Hufschmitt, E.: A handy multi-coupon system. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 66-81. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
26444541889
-
-
Chen, L., Enzmann, M., Sadeghi, A.-R., Schneider, M., Steiner, M.: A privacy-protecting coupon system. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 93-108. Springer, Heidelberg (2005)
-
Chen, L., Enzmann, M., Sadeghi, A.-R., Schneider, M., Steiner, M.: A privacy-protecting coupon system. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 93-108. Springer, Heidelberg (2005)
-
-
-
-
8
-
-
84958774556
-
A statistically hiding integer commitment scheme based on groups with hidden order
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Damgård, I., Fujisaki, E.: A statistically hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
-
-
Damgård, I.1
Fujisaki, E.2
-
9
-
-
35048841283
-
Traceable signatures
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Kiayias, A., Tsiounis, Y., Yung, M.: Traceable signatures. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 571-589. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
10
-
-
0345058958
-
On diophantine complexity and statistical zero-knowledge arguments
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Lipmaa, H.: On diophantine complexity and statistical zero-knowledge arguments. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 398-415. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 398-415
-
-
Lipmaa, H.1
-
11
-
-
38549113721
-
-
Nguyen, L.: Privacy-protecting coupon system revisited. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, Springer, Heidelberg (2006)
-
Nguyen, L.: Privacy-protecting coupon system revisited. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, Springer, Heidelberg (2006)
-
-
-
-
12
-
-
26444607972
-
-
Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 318-333. Springer, Heidelberg (2005)
-
Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 318-333. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
34247095195
-
-
Technical report, Department of Applied Economies and Management, Cornell University
-
Park, K., Gómez, M.: The coupon report: A study of coupon discount methods. Technical report, Department of Applied Economies and Management, Cornell University (2004), http://aem.Cornell.edu/research/researchpdf/rb0407. pdf
-
(2004)
The coupon report: A study of coupon discount methods
-
-
Park, K.1
Gómez, M.2
-
15
-
-
33744781066
-
-
Persiano, P., Visconti, I.: An efficient and usable multi-show non-transferable anonymous credential system. In: Juels, A. (ed.) FC 2004. LNCS, 3110, Springer, Heidelberg (2004)
-
Persiano, P., Visconti, I.: An efficient and usable multi-show non-transferable anonymous credential system. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, Springer, Heidelberg (2004)
-
-
-
-
16
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs. Cryptology ePrint Archive
-
Report 2004/332
-
Shoup, V.: Sequences of games: A tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (2004), http://eprint.iacr. org/
-
(2004)
-
-
Shoup, V.1
-
17
-
-
84948969733
-
-
Syverson, P.F., Stubblebine, S.G., Goldschlag, D.M.: Unlinkable serial transactions. In: FC 1997. LNCS, 1318, pp. 39-56. Springer, Heidelberg (1997)
-
Syverson, P.F., Stubblebine, S.G., Goldschlag, D.M.: Unlinkable serial transactions. In: FC 1997. LNCS, vol. 1318, pp. 39-56. Springer, Heidelberg (1997)
-
-
-
|