-
1
-
-
33749661564
-
A cryptographic framework for the controlled release of certified data
-
Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2004, Springer, Heidelberg
-
Bangerter, E., Camenisch, J., Lysyanskaya, A.: A cryptographic framework for the controlled release of certified data. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2004. LNCS, vol. 3957, pp. 20-42. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3957
, pp. 20-42
-
-
Bangerter, E.1
Camenisch, J.2
Lysyanskaya, A.3
-
2
-
-
33845547238
-
-
Camenisch, J., Sommer, D., Zimmermann, R.: A general certification framework with applications to privacy-enhancing certificate infrastructures. In: Fischer-Hübner, S., Rannenberg, K., Yngström, L., Lindskog, S. (eds.) SEC. IFIP, 201, pp. 25-37. Springer, Heidelberg (2006)
-
Camenisch, J., Sommer, D., Zimmermann, R.: A general certification framework with applications to privacy-enhancing certificate infrastructures. In: Fischer-Hübner, S., Rannenberg, K., Yngström, L., Lindskog, S. (eds.) SEC. IFIP, vol. 201, pp. 25-37. Springer, Heidelberg (2006)
-
-
-
-
3
-
-
52149122432
-
-
Brands, S.: Identity: Setting the larger context, achieving the right outcomes. In: 7th Annual Privacy and Security Workshop & 15th CACR Information Security Workshop (November 2006)
-
Brands, S.: Identity: Setting the larger context, achieving the right outcomes. In: 7th Annual Privacy and Security Workshop & 15th CACR Information Security Workshop (November 2006)
-
-
-
-
4
-
-
33745853424
-
Universal custodian-hiding verifiable encryption for discrete logarithms
-
Won, D.H, Kim, S, eds, ICISC 2005, Springer, Heidelberg
-
Liu, J.K., Tsang, P.P., Wong, D.S., Zhu, R.W.: Universal custodian-hiding verifiable encryption for discrete logarithms. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 389-409. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3935
, pp. 389-409
-
-
Liu, J.K.1
Tsang, P.P.2
Wong, D.S.3
Zhu, R.W.4
-
5
-
-
0030709601
-
Verifiable partial key escrow
-
ACM, New York
-
Bellare, M., Goldwasser, S.: Verifiable partial key escrow. In: 4th ACM CCS, pp. 78-91. ACM, New York (1997)
-
(1997)
4th ACM CCS
, pp. 78-91
-
-
Bellare, M.1
Goldwasser, S.2
-
6
-
-
34547404349
-
-
Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: a taxonomy and open issues. In: Juels, A., Winslett, M., Goto, A. (eds.) DIM, pp. 1-10. ACM, New York (2006)
-
Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: a taxonomy and open issues. In: Juels, A., Winslett, M., Goto, A. (eds.) DIM, pp. 1-10. ACM, New York (2006)
-
-
-
-
7
-
-
35248839965
-
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, 2576, pp. 268-289. Springer, Heidelberg (2003)
-
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Camenisch, J., Shoup, V.: Practical verifiable encryption and decryption of discrete logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126-144. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
9
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M.K, ed, CRYPTO 2004, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
52149094705
-
A user-centric protocol for conditional anonymity revocation
-
Technical Report 13123, Queensland University of Technology March
-
Suriadi, S., Foo, E., Smith, J.: A user-centric protocol for conditional anonymity revocation. Technical Report 13123, Queensland University of Technology (March 2008), http://eprints.qut.edu.au/archive/00013123/
-
(2008)
-
-
Suriadi, S.1
Foo, E.2
Smith, J.3
|