-
1
-
-
14844295011
-
Direct anonymous attestation
-
New York, NY, USA, ACM Press
-
E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 132-145, New York, NY, USA, 2004. ACM Press.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
2
-
-
34547379480
-
How to win the clone wars: Efficient periodic n-times anonymous authentication
-
ACM
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich. How to win the clone wars: Efficient periodic n-times anonymous authentication. In ACM Conference on Computer and Communications Security. ACM, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
3
-
-
33746048789
-
-
I. Damgård, K. Dupont, and M. Ø. Pedersen. Unclonable group identification. In EUROCRYPT, 4004 of Lecture Notes in Computer Science, pages 555 - 572. Springer, 2006.
-
I. Damgård, K. Dupont, and M. Ø. Pedersen. Unclonable group identification. In EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, pages 555 - 572. Springer, 2006.
-
-
-
-
4
-
-
84904332394
-
Statistical disclosure attacks: Traffic confirmation in open environments
-
Athens, May, IFIP TC11, Kluwer
-
G. Danezis. Statistical disclosure attacks: Traffic confirmation in open environments. In Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421-426, Athens, May 2003. IFIP TC11, Kluwer.
-
(2003)
Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003)
, pp. 421-426
-
-
Danezis, G.1
-
6
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
CRYPTO '86, of, Springer Verlag
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer Verlag, 1987.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
7
-
-
44649144215
-
A survey of solutions to the sybil attack
-
University of Massachusetts Amherst, Amherst, MA, Oct
-
B. N. Levine, C. Shields, and N. B. Margolin. A survey of solutions to the sybil attack. Tech report 2006-052, University of Massachusetts Amherst, Amherst, MA, Oct 2006.
-
(2006)
Tech report 2006-052
-
-
Levine, B.N.1
Shields, C.2
Margolin, N.B.3
-
8
-
-
56749178150
-
-
L. Martucci, M. Kohlweiss, C. Andersson, and A. Panchenko. Self-certified Sybil-free Pseudonyms - Introducing Privacy in Wireless Networks. Technical Report Karlstad University Studies, Karlstad University, 2008.
-
L. Martucci, M. Kohlweiss, C. Andersson, and A. Panchenko. Self-certified Sybil-free Pseudonyms - Introducing Privacy in Wireless Networks. Technical Report Karlstad University Studies, Karlstad University, 2008.
-
-
-
-
11
-
-
37849019002
-
Detecting the Sybil Attack in Mobile Ad hoc Networks
-
Baltimore, MD, USA, IEEE Press
-
nd Int Conference on Security and Privacy in Communication Networks, Baltimore, MD, USA, 2006. IEEE Press.
-
(2006)
nd Int Conference on Security and Privacy in Communication Networks
-
-
Piro, C.1
Shields, C.2
Levine, B.N.3
-
13
-
-
35048839792
-
k-times anonymous authentication (extended abstract)
-
ASIACRYPT, of, Springer
-
I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract). In ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, pages 308 - 322. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
15
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
New York, NY, USA, ACM Press
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: defending against sybil attacks via social networks. In SIGCOMM '06, pages 267-278, New York, NY, USA, 2006. ACM Press.
-
(2006)
SIGCOMM '06
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|