-
1
-
-
84921018856
-
A practical and provably secure coalition secure coalition-resistant group signature scheme
-
Springer-Verlag
-
Ateniese, G., Camenisch, J., Joye, M. and Tsudik, G. (2000). A practical and provably secure coalition secure coalition-resistant group signature scheme in Advances in Cryptology - Proceedings of CRYPTO 2000, vol. 1880 of Lecture Notes in Computer Science, Springer-Verlag, 255-270.
-
(2000)
Advances in Cryptology - Proceedings of CRYPTO 2000, Vol. 1880 of Lecture notes in Computer Science
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
84957043547
-
Quasi-efficient revocation of group signatures
-
Springer-Verlag
-
Ateniese, G., Song, D. and Tsudik, G. (2002). Quasi-Efficient Revocation of Group Signatures, in Proceedings of Financial Cryptography, vol. 2357 of Lecture Notes in Computer Science, Springer-Verlag, 183-197.
-
(2002)
Proceedings of Financial Cryptography, Vol. 2357 of Lecture notes in Computer Science
, pp. 183-197
-
-
Ateniese, G.1
Song, D.2
Tsudik, G.3
-
4
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Springer-Verlag
-
Camenisch, J. and Lysyanskaya, A. (2002). Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials, in Advances in Cryptology - Proceedings of CRYPTO 2002, vol. 2442 of Lecture Notes in Computer Science, Springer-Verlag, 61-76.
-
(2002)
Advances in Cryptology - Proceedings of CRYPTO 2002, Vol. 2442 of Lecture notes in Computer Science
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
5
-
-
84958612917
-
Efficient group signature scheme for large groups
-
Springer-Verlag
-
Camenisch, J. and Stadler, M. (1997). Efficient Group Signature Scheme for Large Groups, in Advances in Cryptology - Proceedings of CRYPTO '97, vol. 1294 of Lecture Notes in Computer Science, Springer-Verlag, 410-424.
-
(1997)
Advances in Cryptology - Proceedings of CRYPTO '97, Vol. 1294 of Lecture notes in Computer Science
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
6
-
-
85024290278
-
Group signatures
-
Springer-Verlag
-
Chaum, D. and van Heyst, E. (1991). Group Signatures, in Advances in Cryptology - Proceedings of EURO-CRYPT'91, vol. 547 of Lecture Notes in Computer Science, Springer-Verlag, 257-265.
-
(1991)
Advances in Cryptology - Proceedings of EURO-CRYPT'91, Vol. 547 of Lecture notes in Computer Science
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
9
-
-
84974670888
-
Efficient public auction with one-time registration and public verifiability
-
Springer-Verlag
-
Lee, B., Kim, K. and Ma, J. (2001). Efficient Public Auction with One-time Registration and Public Verifiability, in International Conference on Cryptology in India - Proceedings of INDOCRYPT 2001, vol. 2247 of Lecture Notes in Computer Science, Springer-Verlag, 162-174.
-
(2001)
International Conference on Cryptology in India - Proceedings of INDOCRYPT 2001, Vol. 2247 of Lecture notes in Computer Science
, pp. 162-174
-
-
Lee, B.1
Kim, K.2
Ma, J.3
-
10
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
Naor, M., Pinkas, B. and Sumner, R. (1999). Privacy Preserving Auctions and Mechanism Design, in The 1st ACM Conference on Electronic Commerce, 129-139.
-
(1999)
The 1st ACM Conference on Electronic Commerce
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
11
-
-
23044518297
-
An on-line public auction protocol protecting bidder privacy
-
Springer-Verlag
-
Nguyen, K. and Traore, J. (2000). An On-line Public Auction Protocol Protecting Bidder Privacy, in Proceedings of ACSIP 2000 - Australasian Conference on Information Security and Privacy, vol. 1841 of Lecture Notes in Computer Science, Springer-Verlag, 427-442.
-
(2000)
Proceedings of ACSIP 2000 - Australasian Conference on Information Security and Privacy, Vol. 1841 of Lecture notes in Computer Science
, pp. 427-442
-
-
Nguyen, K.1
Traore, J.2
-
12
-
-
84958775241
-
A practical english auction with one-time registration
-
Springer-Verlag
-
Omote, K. and Miyaji, A. (2001). A Practical English Auction with One-Time Registration, in Proceedings of ACSIP 2001 - Australasian Conference on Information Security and Privacy, vol. 2119 of Lecture Notes in Computer Science, Springer-Verlag, 221-234.
-
(2001)
Proceedings of ACSIP 2001 - Australasian Conference on Information Security and Privacy, Vol. 2119 of Lecture notes in Computer Science
, pp. 221-234
-
-
Omote, K.1
Miyaji, A.2
-
13
-
-
84956867136
-
Fair on-line auctions without special trusted parties
-
Springer-Verlag
-
Stubblebine, S. and Syverson, P. (1999). Fair On-line Auctions Without Special Trusted Parties, in Proceedings of Financial Cryptography 1999, vol. 1648 of Lecture Notes in Computer Science, Springer-Verlag, 230-240.
-
(1999)
Proceedings of Financial Cryptography 1999, Vol. 1648 of Lecture notes in Computer Science
, pp. 230-240
-
-
Stubblebine, S.1
Syverson, P.2
-
14
-
-
0344628463
-
Accumulating composites and improved group signing
-
Springer-Verlag
-
Tsudik, G. and Xu, S. (2003). Accumulating Composites and Improved Group Signing, in Advances in Cryptology - Proceedings of ASIACRYPT 2003, vol. 2894 of Lecture Notes in Computer Science, Springer-Verlag, 269-286.
-
(2003)
Advances in Cryptology - Proceedings of ASIACRYPT 2003, Vol. 2894 of Lecture notes in Computer Science
, pp. 269-286
-
-
Tsudik, G.1
Xu, S.2
-
15
-
-
77954111970
-
Security, anonymity and trust in electronic auctions
-
Spring Edition, 3-9
-
Trevathan, J. (2005). Security, Anonymity and Trust in Electronic Auctions, Association for Computing Machinery Crossroads, Spring Edition, 3-9, vol. 11.3.
-
(2005)
Association for Computing Machinery Crossroads
, vol.11
, Issue.3
-
-
Trevathan, J.1
-
16
-
-
33749636302
-
Design issues for electronic auctions
-
Trevathan, J., Ghodosi, H. and Read, W. (2005). Design Issues for Electronic Auctions, in 2nd International Conference on E-Business and Telecommunication Networks, 340-347.
-
(2005)
2nd International Conference on E-Business and Telecommunication Networks
, pp. 340-347
-
-
Trevathan, J.1
Ghodosi, H.2
Read, W.3
-
17
-
-
33749604812
-
An anonymous and secure continuous double auction scheme
-
Trevathan, J., Ghodosi, H. and Read, W. (2006). An Anonymous and Secure Continuous Double Auction Scheme, in 39th International Hawaii Conference on System Sciences, 125(1-12).
-
(2006)
39th International Hawaii Conference on System Sciences
, vol.125
, Issue.1-12
-
-
Trevathan, J.1
Ghodosi, H.2
Read, W.3
-
18
-
-
84958975522
-
A three phased schema for sealed bid auction system design
-
Springer-Verlag
-
Viswanathan, K., Boyd, C. and Dawson, E. (2000). A Three Phased Schema for Sealed Bid Auction System Design, Proceedings of ACSIP 2000 - Australasian Conference on Information Security and Privacy, vol. 1841 of Lecture Notes in Computer Science, Springer-Verlag, 412-426.
-
(2000)
Proceedings of ACSIP 2000 - Australasian Conference on Information Security and Privacy, Vol. 1841 of Lecture notes in Computer Science
, pp. 412-426
-
-
Viswanathan, K.1
Boyd, C.2
Dawson, E.3
|