-
1
-
-
33846981890
-
Trust in PRIME
-
Andersson, C., Camenisch, J., Crane, S., Fischer-Hübner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D.: Trust in PRIME. In: Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, pp. 552-559 (2005)
-
(2005)
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology
, pp. 552-559
-
-
Andersson, C.1
Camenisch, J.2
Crane, S.3
Fischer-Hübner, S.4
Leenes, R.5
Pearson, S.6
Pettersson, J.S.7
Sommer, D.8
-
3
-
-
24144462516
-
-
Bangerter, E., Camenisch, J., Maurer, U.M.: Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 154-171. Springer, Heidelberg (2005)
-
Bangerter, E., Camenisch, J., Maurer, U.M.: Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 154-171. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
34547404349
-
User centricity: A taxonomy and open issues
-
ACM Press, New York
-
Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: a taxonomy and open issues. In: DIM 2006: Proceedings of the second ACM workshop on Digital identity management, pp. 1-10. ACM Press, New York (2006)
-
(2006)
DIM 2006: Proceedings of the second ACM workshop on Digital identity management
, pp. 1-10
-
-
Bhargav-Spantzel, A.1
Camenisch, J.2
Gross, T.3
Sommer, D.4
-
5
-
-
58349083432
-
Usable presentation of secure pseudonyms
-
ACM Press, New York
-
Borcea-Pfitzmann, K., Franz, E., Pfitzmann, A.: Usable presentation of secure pseudonyms. In: DIM 2005: Proceedings of the 2005 workshop on Digital identity management, pp. 70-76. ACM Press, New York (2005)
-
(2005)
DIM 2005: Proceedings of the 2005 workshop on Digital identity management
, pp. 70-76
-
-
Borcea-Pfitzmann, K.1
Franz, E.2
Pfitzmann, A.3
-
6
-
-
84948973732
-
Efficient Proofs that a Committed Number Lies in an Interval
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Boudot, F.: Efficient Proofs that a Committed Number Lies in an Interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 431-444. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
7
-
-
84957366640
-
Rapid Demonstration of Linear Relations Connected by Boolean Operators
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Brands, S.: Rapid Demonstration of Linear Relations Connected by Boolean Operators. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 318-333. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 318-333
-
-
Brands, S.1
-
8
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press, New York
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, pp. 132-145. ACM Press, New York (2004)
-
(2004)
CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
9
-
-
34547379480
-
How to win the clone wars: Efficient periodic n-times anonymous authentication
-
ACM, New York
-
Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clone wars: Efficient periodic n-times anonymous authentication. In: ACM Conference on Computer and Communications Security, ACM, New York (2006)
-
(2006)
ACM Conference on Computer and Communications Security
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
10
-
-
24944435537
-
Compact E-Cash
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact E-Cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
11
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
35248839965
-
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
-
-
-
13
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
24644493543
-
Proof systems for general statements about discrete logarithms
-
Institute for Theoretical Computer Science, ETH Zürich March
-
Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH Zürich (March 1997)
-
(1997)
Technical Report TR
, vol.260
-
-
Camenisch, J.1
Stadler, M.2
-
15
-
-
33746048789
-
Unclonable group identification
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Damgård, I., Dupont, K., Pedersen, M.Ø.: Unclonable group identification. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 555-572. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 555-572
-
-
Damgård, I.1
Dupont, K.2
Pedersen, M.Ø.3
-
16
-
-
24144481228
-
-
Dodis, Y., Yampolskiy, A.: A Verifiable Random Function with Short Proofs and Keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 416-431. Springer, Heidelberg (2005)
-
Dodis, Y., Yampolskiy, A.: A Verifiable Random Function with Short Proofs and Keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
84947273682
-
The Sybil Attack
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
18
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
19
-
-
33750955441
-
Intra-application partitioning in an elearning environment - a discussion of critical aspects
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Franz, E., Borcea-Pfitzmann, K.: Intra-application partitioning in an elearning environment - a discussion of critical aspects. In: ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security (ARES 2006), Washington, DC, USA, pp. 872-878. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security (ARES
, pp. 872-878
-
-
Franz, E.1
Borcea-Pfitzmann, K.2
-
20
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 16-30. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
21
-
-
44649104819
-
Admission control in peer groups. In: NCA
-
Los Alamitos
-
Kim, Y., Mazzocchi, D., Tsudik, G.: Admission control in peer groups. In: NCA, pp. 131-139. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
IEEE Computer Society
, pp. 131-139
-
-
Kim, Y.1
Mazzocchi, D.2
Tsudik, G.3
-
22
-
-
33745851054
-
-
Kunz-Jacques, S., Martinet, G., Poupard, G., Stern, J.: Cryptanalysis of an efficient proof of knowledge of discrete logarithm. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 27-43. Springer, Heidelberg (2006)
-
Kunz-Jacques, S., Martinet, G., Poupard, G., Stern, J.: Cryptanalysis of an efficient proof of knowledge of discrete logarithm. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 27-43. Springer, Heidelberg (2006)
-
-
-
-
23
-
-
44649144215
-
A survey of solutions to the sybil attack
-
University of Massachusetts Amherst, Amherst, MA October
-
Levine, B.N., Shields, C., Margolin, N.B.: A survey of solutions to the sybil attack. Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA (October 2006)
-
(2006)
Tech report 2006-052
-
-
Levine, B.N.1
Shields, C.2
Margolin, N.B.3
-
24
-
-
84982943258
-
-
Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) Crypto 1992. LNCS, 576, pp. 129-140. Springer, Heidelberg (1992)
-
Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) Crypto 1992. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
-
-
-
25
-
-
4544314577
-
-
Saxena, N., Tsudik, G., Yi, J.H.: Admission control in peer-to-peer: design and performance evaluation. In: Setia, S., Swarup, V. (eds.) SASN, pp. 104-113. ACM, New York (2003)
-
Saxena, N., Tsudik, G., Yi, J.H.: Admission control in peer-to-peer: design and performance evaluation. In: Setia, S., Swarup, V. (eds.) SASN, pp. 104-113. ACM, New York (2003)
-
-
-
-
26
-
-
33750959755
-
Efficient node admission for short-lived mobile ad hoc networks. In: ICNP
-
Los Alamitos
-
Saxena, N., Tsudik, G., Yi, J.H.: Efficient node admission for short-lived mobile ad hoc networks. In: ICNP, pp. 269-278. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Computer Society
, pp. 269-278
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
27
-
-
12344258539
-
Efficient signature generation for smart cards
-
Schnorr, C.P.: Efficient signature generation for smart cards. Journal of Cryptology 4(3), 239-252 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
28
-
-
35048839792
-
k-times anonymous authentication (extended abstract)
-
Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
-
Teranishi, I., Furukawa, J., Sako, K.: k-times anonymous authentication (extended abstract). In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 308-322. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
29
-
-
33750285481
-
-
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against sybil attacks via social networks. In: SIGCOMM 2006, pp. 267-278. ACM Press, New York (2006)
-
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against sybil attacks via social networks. In: SIGCOMM 2006, pp. 267-278. ACM Press, New York (2006)
-
-
-
|