-
2
-
-
84945135810
-
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceedings, 2045 of Lecture Notes in Computer Science, pages 93-118. Springer Verlag, Berlin, 2001.
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceedings, volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer Verlag, Berlin, 2001.
-
-
-
-
3
-
-
35048845114
-
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In M. Franklin, editor, Proceedings of the 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19 - CRYPTO 2004, 3152 of Lecture Notes in Computer Science, pages 56-72. Springer Verlag, Berlin, 2004.
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In M. Franklin, editor, Proceedings of the 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19 - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 56-72. Springer Verlag, Berlin, 2004.
-
-
-
-
4
-
-
85032463527
-
Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms
-
J. Seberry and J. Pieprzyk, editors, Advances in Cryptology, AUSCRYPT 90, of, Springer Verlag, Berlin
-
D. Chaum. Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. In J. Seberry and J. Pieprzyk, editors, Advances in Cryptology - AUSCRYPT 90, volume 453 of Lecture Notes in Computer Science, pages 246-264. Springer Verlag, Berlin, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.453
, pp. 246-264
-
-
Chaum, D.1
-
5
-
-
84955571224
-
-
L. Chen. Access with pseudonyms. In E. Dawson and J. D. Golic, editors, Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, number 1029 in Lecture Notes in in Computer Science, pages 232-243. Springer Verlag, Berlin, 1995.
-
L. Chen. Access with pseudonyms. In E. Dawson and J. D. Golic, editors, Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, number 1029 in Lecture Notes in in Computer Science, pages 232-243. Springer Verlag, Berlin, 1995.
-
-
-
-
6
-
-
85031802442
-
Payment systems and credential mechanisms with provable security against abuse by individuals
-
S. Goldwasser, editor, Advances in Cryptology -CRYPTO '88: Proceedings, number in, Springer Verlag, Berlin
-
I. Damgård. Payment systems and credential mechanisms with provable security against abuse by individuals. In S. Goldwasser, editor, Advances in Cryptology -CRYPTO '88: Proceedings, number 403 in Lecture Notes in Computer Science, pages 328-335. Springer Verlag, Berlin, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.403
, pp. 328-335
-
-
Damgård, I.1
-
7
-
-
27944466840
-
Prime clauses for fast enumeration of satisfying assignments to boolean circuits
-
New York, NY, USA, ACM Press
-
H. Jin and F. Somenzi. Prime clauses for fast enumeration of satisfying assignments to boolean circuits. In DAC '05: Proceedings of the 42nd Annual Conference on Design Automation, pages 750-753, New York, NY, USA, 2005. ACM Press.
-
(2005)
DAC '05: Proceedings of the 42nd Annual Conference on Design Automation
, pp. 750-753
-
-
Jin, H.1
Somenzi, F.2
-
8
-
-
35248900308
-
Limits of anonymity in open environments
-
F. Petitcolas, editor, Proceedings of the 5th International Information Hiding Workshop, IH 2002, of, Springer Verlag, Berlin
-
D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In F. Petitcolas, editor, Proceedings of the 5th International Information Hiding Workshop, IH 2002, volume 2578 of Lecture Notes in Computer Science, pages 53-69. Springer Verlag, Berlin, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2578
, pp. 53-69
-
-
Kesdogan, D.1
Agrawal, D.2
Penz, S.3
-
9
-
-
67651053584
-
-
A. Lysyanskaya, R. L. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. In H. M. Heys and C. M. Adams, editors, Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, 1758 of Lecture Notes in Computer Science, pages 184-199. Springer Verlag, Berlin, 2000.
-
A. Lysyanskaya, R. L. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. In H. M. Heys and C. M. Adams, editors, Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, volume 1758 of Lecture Notes in Computer Science, pages 184-199. Springer Verlag, Berlin, 2000.
-
-
-
-
10
-
-
0004206211
-
-
Prentice Hall, third edition
-
M. Mano. Digital Design. Prentice Hall, third edition, 2001.
-
(2001)
Digital Design
-
-
Mano, M.1
-
11
-
-
84902479270
-
A security model for anonymous credential systems
-
S. J. Y. Deswarte, F. Cuppens and L. Wang, editors, Kluwer Academic Publishers, August
-
A. Pashalidis and C. Mitchell. A security model for anonymous credential systems. In S. J. Y. Deswarte, F. Cuppens and L. Wang, editors, Information Security Management, Education and Privacy, Proceedings of the 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems (I-NetSec'04), pages 183-199. Kluwer Academic Publishers, August 2004.
-
(2004)
Information Security Management, Education and Privacy, Proceedings of the 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems (I-NetSec'04)
, pp. 183-199
-
-
Pashalidis, A.1
Mitchell, C.2
-
12
-
-
33744781066
-
An efficient and usable multi-show non-transferable anonymous credential system
-
A. Juels, editor, Proceedings of the Eighth International Financial Cryptography Conference FC '04, of, Springer Verlag, Berlin
-
G. Persiano and I. Visconti. An efficient and usable multi-show non-transferable anonymous credential system. In A. Juels, editor, Proceedings of the Eighth International Financial Cryptography Conference (FC '04), volume 3110 of Lecture Notes in Computer Science, pages 196-211. Springer Verlag, Berlin, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3110
, pp. 196-211
-
-
Persiano, G.1
Visconti, I.2
-
14
-
-
35248849922
-
Modelling unlinkability
-
R. Dingledine, editor, Privacy Enhancing Technologies, Third International Workshop, PET, Dresden, Germany, March 26-28, Revised Papers, of, Springer Verlag, Berlin, 2003
-
S. Steinbrecher and S. Köpsell. Modelling unlinkability. In R. Dingledine, editor, Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, volume 2760 of Lecture Notes in Computer Science, pages 32-47. Springer Verlag, Berlin, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2760
, pp. 32-47
-
-
Steinbrecher, S.1
Köpsell, S.2
-
15
-
-
84946849368
-
Self-blindable credential certificates from the Weil pairing
-
C. Boyd, editor, ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, of, Springer Verlag, Berlin
-
E. R. Verheul. Self-blindable credential certificates from the Weil pairing. In C. Boyd, editor, ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, volume 2248 of Lecture Notes in Computer Science, pages 533-551. Springer Verlag, Berlin, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 533-551
-
-
Verheul, E.R.1
-
16
-
-
84948963495
-
-
L. Zhang and S. Malik. The quest for efficient boolean satisfiability solvers. In A. Voronkov, editor, Automated Deduction - CADE-18, 18th International Conference on Automated Deduction, Copenhagen, Denmark, July 27-30, 2002, Proceedings, 2392 of Lecture Notes in Computer Science, pages 295-313. Springer Verlag, Berlin, 2002.
-
L. Zhang and S. Malik. The quest for efficient boolean satisfiability solvers. In A. Voronkov, editor, Automated Deduction - CADE-18, 18th International Conference on Automated Deduction, Copenhagen, Denmark, July 27-30, 2002, Proceedings, volume 2392 of Lecture Notes in Computer Science, pages 295-313. Springer Verlag, Berlin, 2002.
-
-
-
|