-
2
-
-
0030646696
-
Optimistic protocols for fair exchange
-
Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: ACM Conference on Computer and Communications Security, pp. 7-17 (1997)
-
(1997)
ACM Conference on Computer and Communications Security
, pp. 7-17
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
3
-
-
84957616594
-
Optimistic fair exchange of digital signatures (extended abstract)
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures (extended abstract). In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 591-606. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
4
-
-
45749155233
-
-
Ateniese, G., Blanton, M., Kirsch, J.: Secret Handshakes with Dynamic and Fuzzy Matching. In: NDSS, The Internet Society (2007)
-
Ateniese, G., Blanton, M., Kirsch, J.: Secret Handshakes with Dynamic and Fuzzy Matching. In: NDSS, The Internet Society (2007)
-
-
-
-
5
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255-270. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
6
-
-
33746354988
-
-
Au, M.H., Susilo, W., Yiu, S.-M.: Event-oriented k-times revocable-iff-linked group signatures. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 223-234. Springer, Heidelberg (2006)
-
Au, M.H., Susilo, W., Yiu, S.-M.: Event-oriented k-times revocable-iff-linked group signatures. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 223-234. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
0038487086
-
Secret Handshakes from Pairing-Based Key Agreements
-
IEEE Computer Society Press, Los Alamitos
-
Balfanz, D., Durfee, G., Shankar, N., Smetters, D.K., Staddon, J., Wong, H.-C.: Secret Handshakes from Pairing-Based Key Agreements. In: IEEE Symposium on Security and Privacy, pp. 180-196. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.K.4
Staddon, J.5
Wong, H.-C.6
-
9
-
-
35048848152
-
Short signatures without random oracles
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
35048887476
-
Short group signatures
-
Franklin, M.K, ed, CRYPTO 2004, Springer, Heidelberg
-
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
12
-
-
37849048533
-
Efficient and robust pseudonymous authentication in vanet
-
ACM Press, New York
-
Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in vanet. In: VANET 2007: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks, pp. 19-28. ACM Press, New York (2007)
-
(2007)
VANET 2007: Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
13
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
ACM Press, New York
-
Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clonewars: efficient periodic n-times anonymous authentication. In: ACM Conference on Computer and Communications Security, pp. 201-210. ACM Press, New York (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
14
-
-
24944435537
-
Compact e-cash
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
15
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61-76. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
35248839965
-
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
-
-
-
18
-
-
84958612917
-
Efficient group signature schemes for large groups (extended abstract)
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups (extended abstract). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
19
-
-
35048855095
-
Secret handshakes from ca-oblivious encryption
-
Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
-
Castelluccia, C., Jarecki, S., Tsudik, G.: Secret handshakes from ca-oblivious encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293-307. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 293-307
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
20
-
-
0020915882
-
Blind signatures for untraceable payments
-
Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO, pp. 199-203 (1982)
-
(1982)
CRYPTO
, pp. 199-203
-
-
Chaum, D.1
-
21
-
-
85024290278
-
Group signatures
-
Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
van Heyst, E.2
-
22
-
-
30044436588
-
Content availability, pollution and poisoning in file sharing peer-to-peer networks
-
ACM Press, New York
-
Christin, N., Weigend, A.S., Chuang, J.: Content availability, pollution and poisoning in file sharing peer-to-peer networks. In: ACM Conference on Electronic Commerce, pp. 68-77. ACM Press, New York (2005)
-
(2005)
ACM Conference on Electronic Commerce
, pp. 68-77
-
-
Christin, N.1
Weigend, A.S.2
Chuang, J.3
-
23
-
-
35048854233
-
Anonymous identification in ad hoc groups
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous identification in ad hoc groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 609-626. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 609-626
-
-
Dodis, Y.1
Kiayias, A.2
Nicolosi, A.3
Shoup, V.4
-
24
-
-
84947273682
-
The sybil attack
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
26
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186-208 (1989)
-
(1989)
SIAM J. Comput
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
27
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281-308 (1988)
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
28
-
-
38049035427
-
Inference attacks on location tracks
-
LaMarca, A, Langheinrich, M, Truong, K.N, eds, Pervasive 2007, Springer, Heidelberg
-
Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127-143. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4480
, pp. 127-143
-
-
Krumm, J.1
-
29
-
-
26444607972
-
-
Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 318-333. Springer, Heidelberg (2005)
-
Nguyen, L., Safavi-Naini, R.: Dynamic k-times anonymous authentication. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 318-333. Springer, Heidelberg (2005)
-
-
-
-
31
-
-
84946833891
-
How to leak a secret
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552-565. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
32
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
33
-
-
35048839792
-
k-times anonymous authentication (extended abstract)
-
Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
-
Teranishi, I., Furukawa, J., Sako, K.: k-times anonymous authentication (extended abstract). In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 308-322. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
34
-
-
33745871113
-
-
Teranishi, I., Sako, K.: k-times anonymous authentication with a constant proving cost. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 525-542. Springer, Heidelberg (2006)
-
Teranishi, I., Sako, K.: k-times anonymous authentication with a constant proving cost. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 525-542. Springer, Heidelberg (2006)
-
-
-
-
35
-
-
45749094170
-
-
TPM Work Group. TCG TPM Specification Version 1.2 Revision 103. Technical report, Trusted Computing Group (2007)
-
TPM Work Group. TCG TPM Specification Version 1.2 Revision 103. Technical report, Trusted Computing Group (2007)
-
-
-
-
36
-
-
45749119536
-
PPAA: Peer-to-peer anonymous authentication (extended version)
-
Technical Report TR2008-615, Department of Computer Science, Dartmouth College April
-
Tsang, P.P., Smith, S.W.: PPAA: Peer-to-peer anonymous authentication (extended version). Technical Report TR2008-615, Department of Computer Science, Dartmouth College (April 2008)
-
(2008)
-
-
Tsang, P.P.1
Smith, S.W.2
-
37
-
-
24644503853
-
Separable linkable threshold ring signatures
-
Canteaut, A, Viswanathan, K, eds, INDOCRYPT 2004, Springer, Heidelberg
-
Tsang, P.P., Wei, V.K., Chan, T.K., Au, M.H., Liu, J.K., Wong, D.S.: Separable linkable threshold ring signatures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 384-398. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3348
, pp. 384-398
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Au, M.H.4
Liu, J.K.5
Wong, D.S.6
-
38
-
-
49049098105
-
-
Tsudik, G., Xu, S.: A flexible framework for secret handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 295-315. Springer, Heidelberg (2006)
-
Tsudik, G., Xu, S.: A flexible framework for secret handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 295-315. Springer, Heidelberg (2006)
-
-
-
-
39
-
-
35248831179
-
Captcha: Using hard ai problems for security
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Captcha: Using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294-311. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
40
-
-
14844289583
-
M.: K-anonymous secret handshakes with reusable credentials
-
ACM Press, New York
-
Xu, S., Yung, M.: k-anonymous secret handshakes with reusable credentials. In: ACM Conference on Computer and Communications Security, pp. 158-167. ACM Press, New York (2004)
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 158-167
-
-
Xu, S.1
Yung2
|