-
1
-
-
54249157095
-
An efficient anonymous credential system
-
N.Akagi,Y.Manabe, and T.Okamoto, "An efficient anonymous credential system," Financ. Cryptogr., vol.5143, pp. 272-286, 2008.
-
(2008)
Financ. Cryptogr.
, vol.5143
, pp. 272-286
-
-
Akagi, N.1
Manabe, Y.2
Okamoto, T.3
-
2
-
-
33745459183
-
Establishing and protecting digital identity in federation systems
-
A. Bhargav-Spantzel, A. C. Squicciarini, and E. Bertino, "Establishing and protecting digital identity in federation systems," J. Comput. Secur., vol.14, no.3, pp. 269-300, 2006. (Pubitemid 43953671)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.3
, pp. 269-300
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Bertino, E.3
-
3
-
-
77953703808
-
Biometrics-based identifiers for digital identity management
-
presented at, Gaithersburg, MD
-
A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino, X. Kong, and W. Zhang, "Biometrics-based identifiers for digital identity management," presented at the IDTrust, Gaithersburg, MD, 2010.
-
The IDTrust
, pp. 2010
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Bertino, E.3
Kong, X.4
Zhang, W.5
-
4
-
-
21144441197
-
Aggregate verifiably encrypted signatures from bilinear maps
-
Proc. Adv. Cryptol. (Eurocrypt). Berlin, Germany: Springer-Verlag
-
D. Boneh, C. Gentry, H. Shacham, and B. Lynn, "Aggregate verifiably encrypted signatures from bilinear maps," in Proc. Adv. Cryptol. (Eurocrypt). LNCS, Berlin, Germany: Springer-Verlag, 2003.
-
(2003)
LNCS
-
-
Boneh, D.1
Gentry, C.2
Shacham, H.3
Lynn, B.4
-
5
-
-
84946840347
-
Short signatures from the weil pairing
-
Advances in Cryptology - ASIACRYPT 2001
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," Lect. Notes Comput. Sci., vol.2248, pp. 514-532, 2001. (Pubitemid 33371204)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
6
-
-
84867248592
-
Untraceable off-line cash in wallet with observers
-
New York, NY: Springer-Verlag
-
S. Brands, "Untraceable off-line cash in wallet with observers," in Proc. 13th Annu. Int. Cryptol. Conf. Adv. Cryptol. (CRYPTO). New York, NY: Springer-Verlag, 1994, pp. 302-318.
-
(1994)
Proc. 13th Annu. Int. Cryptol. Conf. Adv. Cryptol. (CRYPTO)
, pp. 302-318
-
-
Brands, S.1
-
7
-
-
0038687775
-
Design implementation of the idemix anonymous credential system
-
New York, NY: ACM Press
-
J. Camenisch and E. V. Herreweghen, "Design implementation of the idemix anonymous credential system," in Proc. 9th ACM Conf. Comput. Commun. Secur. (CCS), New York, NY: ACM Press, 2002, pp. 21-30.
-
(2002)
Proc. 9th ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 21-30
-
-
Camenisch, J.1
Herreweghen, E.V.2
-
8
-
-
84945135810
-
An efficient system for nontransferable anonymous credentials with optional anonymity revocation
-
J. Camenisch and A. Lysyanskaya, "An efficient system for nontransferable anonymous credentials with optional anonymity revocation," Lect. Notes Comput. Sci., vol.2045, pp. 93-118, 2001.
-
(2001)
Lect. Notes Comput. Sci.
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
24944577209
-
Signature schemes and anonymous credentials from bilinear maps
-
presented at, Santa Barbara, CA
-
J. Camenisch and A. Lysyanskaya, "Signature schemes and anonymous credentials from bilinear maps," presented at theAdv.Cryptol. (CRYPTO), Santa Barbara, CA, 2004.
-
(2004)
The Adv.Cryptol. (CRYPTO)
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
84958612917
-
Efficient group signature schemes for large groups
-
J. Camenisch and M. Stadler, "Efficient group signature schemes for large groups," in Proc. Adv. Cryptol. (CRYPTO), 1997, pp. 410-424.
-
(1997)
Proc. Adv. Cryptol. (CRYPTO)
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
11
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," Commun. ACM, vol.28, no.10, pp. 1030-1044, 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
14
-
-
84958774556
-
A statistically-hiding integer commitment scheme based on groups with hidden order
-
London, U.K.: Springer- Verlag
-
I. Damgard and E. Fujisaki, "A statistically-hiding integer commitment scheme based on groups with hidden order," in Proc. 8th Int. Conf. Theory Appl. Cryptol. Inf. Secur. (ASIACRYPT). London, U.K.: Springer- Verlag, 2002, pp. 125-142.
-
(2002)
Proc. 8th Int. Conf. Theory Appl. Cryptol. Inf. Secur. (ASIACRYPT)
, pp. 125-142
-
-
Damgard, I.1
Fujisaki, E.2
-
15
-
-
84990731886
-
How to prove yourself: Practical solutions to identification signature problems
-
London, U.K.: Springer-Verlag
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification signature problems," in Proc. Adv. Cryptol. (CRYPTO). London, U.K.: Springer-Verlag, 1987, pp. 186-194.
-
(1987)
Proc. Adv. Cryptol. (CRYPTO)
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
77953708384
-
-
Piscataway NJ, [Online]. Available
-
Liberty Alliance Project, Piscataway, NJ. (2008). [Online]. Available: http://www.projectliberty.org
-
(2008)
-
-
-
17
-
-
67651053584
-
Pseudonym systems
-
A. Lysyanskaya, R. L. Rivest, A. Sahai, and S. Wolf, "Pseudonym systems," in Proc. Selected Areas Cryptogr., 1999, pp. 184-199.
-
(1999)
Proc. Selected Areas Cryptogr.
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
18
-
-
33645133488
-
WS-specification: Specifying Web services using UDDI improvements
-
London, U.K.: Springer-Verlag. [Revised papers]
-
S. Overhage and P. Thomas, "WS-specification: SpecifyingWeb services using UDDI improvements," in NODe 2002 Web and Database-Related Workshops on Web, Web-Services, and Database Systems. London, U.K.: Springer-Verlag, 2003, pp. 100-119. [Revised papers].
-
(2003)
NODe 2002 Web and Database-Related Workshops on Web, Web-Services, and Database Systems
, pp. 100-119
-
-
Overhage, S.1
Thomas, P.2
-
19
-
-
84982943258
-
Non-interactive information-theoretic secure verifiable secret sharing
-
London, U.K.: Springer-Verlag
-
T. P. Pedersen, "Non-interactive information-theoretic secure verifiable secret sharing," in Proc. 11th Annu. Int. Cryptol. Conf. Adv. Cryptol. (CRYPTO). London, U.K.: Springer-Verlag, 1992, pp. 129-140.
-
(1992)
Proc. 11th Annu. Int. Cryptol. Conf. Adv. Cryptol. (CRYPTO)
, pp. 129-140
-
-
Pedersen, T.P.1
-
21
-
-
63749100767
-
Verification of receipts from m-commerce transactions on nfc cellular phones
-
J. Woo, A. Bhargav-Spantzel, A. C. Squicciarini, and E. Bertino, "Verification of receipts from m-commerce transactions on nfc cellular phones," in Proc. CEC/EEE, 2008, pp. 36-43.
-
(2008)
Proc. CEC/EEE
, pp. 36-43
-
-
Woo, J.1
Bhargav-Spantzel, A.2
Squicciarini, A.C.3
Bertino, E.4
|