-
1
-
-
14844295011
-
Direct anonymous attestation
-
Brickell E, Camenisch J, Chen LQ, eds. New York: ACM Press
-
Brickell EF, Camenisch J, Chen LQ. Direct anonymous attestation. In: Brickell E, Camenisch J, Chen LQ, eds. Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 132-145.
-
(2004)
Proc. of the ACM Conf. on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.F.1
Camenisch, J.2
Chen, L.Q.3
-
3
-
-
20444390989
-
An efficient and secure dynamic group signature scheme
-
(in Chinese with English abstract) [doi: 10.1360/jos160609]
-
He YF, Zhang JZ. An efficient and secure dynamic group signature scheme. Journal of Software, 2005, 16(4):609-615 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/16/609.htm [doi: 10.1360/jos160609]
-
(2005)
Journal of Software
, vol.16
, Issue.4
, pp. 609-615
-
-
He, Y.F.1
Zhang, J.Z.2
-
4
-
-
35048847167
-
Better privacy for trusted computing platforms
-
Molva D, ed. Berlin: Springer-Verlag
-
Camenisch J. Better privacy for trusted computing platforms. In: Molva D, ed. Proc. of the ESORICS. Berlin: Springer-Verlag, 2004. 73-88.
-
(2004)
Proc. of the ESORICS
, pp. 73-88
-
-
Camenisch, J.1
-
6
-
-
38149070279
-
Direct anonymous attestation (DAA): Ensuring privacy with corrupt administrators
-
Stajano F, ed. LNCS 4572, Berlin: Springer-Verlag
-
Smyth B, Ryan M, Chen LQ, Ryan M. Direct anonymous attestation (DAA): Ensuring privacy with corrupt administrators. In: Stajano F, ed. Proc. of the 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007). LNCS 4572, Berlin: Springer-Verlag, 2007. 218-231.
-
(2007)
Proc. of the 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007)
, pp. 218-231
-
-
Smyth, B.1
Ryan, M.2
Chen, L.Q.3
Ryan, M.4
-
8
-
-
33845516445
-
Protecting (anonymous) credentials with the trusted computing group's TPM V1.2
-
Berlin: Springer-Verlag
-
Camenisch J. Protecting (anonymous) credentials with the trusted computing group's TPM V1.2. In: Proc. of the SEC 2006. Berlin: Springer-Verlag, 2006. 135-147.
-
(2006)
Proc. of the SEC 2006
, pp. 135-147
-
-
Camenisch, J.1
-
9
-
-
38149073252
-
Ninja: Non identity based, privacy preserving authentication for ubiquitous environments
-
Krumm P, ed. LNCS 4717, Berlin: Springer-Verlag
-
Leung A, Mitchell CJ. Ninja: Non identity based, privacy preserving authentication for ubiquitous environments. In: Krumm P, ed. Proc. of the 9th Int'l Conf. on Ubiquitous Computing. LNCS 4717, Berlin: Springer-Verlag, 2007. 73-90.
-
(2007)
Proc. of the 9th Int'l Conf. on Ubiquitous Computing
, pp. 73-90
-
-
Leung, A.1
Mitchell, C.J.2
-
10
-
-
38049042811
-
A direct anonymous attestation scheme for embedded devices
-
Berlin: Springer-Verlag
-
He G, Tate SR. A direct anonymous attestation scheme for embedded devices. In: Proc. of the Public Key Cryptography 2007. Berlin: Springer-Verlag, 2007. 16-30.
-
(2007)
Proc. of the Public Key Cryptography 2007
, pp. 16-30
-
-
He, G.1
Tate, S.R.2
-
11
-
-
14844309671
-
Group signatures with verifier-local revocation
-
Atluri V, Pfitzmann B, McDaniel PD, eds. New York: ACM Press
-
Boneh D, Shacham H. Group signatures with verifier-local revocation. In: Atluri V, Pfitzmann B, McDaniel PD, eds. Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2004. 168-177.
-
(2004)
Proc. of the ACM Conf. on Computer and Communications Security
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
12
-
-
33646781565
-
An efficient group signature scheme from bilinear maps
-
Furukawa J, Imai H. An efficient group signature scheme from bilinear maps. IEICE Trans. on Fundamentals, 2006, 89-A(5): 1328-1338.
-
(2006)
IEICE Trans. on Fundamentals
, vol.89 A
, Issue.5
, pp. 1328-1338
-
-
Furukawa, J.1
Imai, H.2
-
13
-
-
84982943258
-
Non-Interactive and information-theoretic secure verifiable secret sharing
-
Feigenbaum J, ed. LNCS 576, Berlin: Springer-Verlag
-
Pedersen TP. Non-Interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum J, ed. Advances in Cryptology-CRYPTO'91. LNCS 576, Berlin: Springer-Verlag, 1992. 129-140.
-
(1992)
Advances in Cryptology-CRYPTO'91
, pp. 129-140
-
-
Pedersen, T.P.1
-
14
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Kaliski B, ed. LNCS 1296, Berlin: Springer-Verlag
-
Camenisch J, Stadler M. Efficient group signature schemes for large groups. In: Kaliski B, ed. Advances in Cryptology-CRYPTO'97. LNCS 1296, Berlin: Springer-Verlag, 1997. 410-424.
-
(1997)
Advances in Cryptology-CRYPTO'97
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
15
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
LNCS 263, Berlin: Springer-Verlag
-
Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In: Proc. of the CRYPTO'86. LNCS 263, Berlin: Springer-Verlag, 1986. 186-194.
-
(1986)
Proc. of the CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
26444562547
-
New explicit conditions of elliptic curve traces for FR-reduction
-
Miyaji A, Nakabayashi M, Takano S. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. on Fundamentals, 2002, E85-A(2):481-484.
-
(2002)
IEICE Trans. on Fundamentals
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
18
-
-
0342880858
-
Studies in secure multiparty computation and applications
-
Rehovot: Weizmann Institute of Science
-
Canetti R. Studies in secure multiparty computation and applications [Ph.D. Thesis]. Rehovot: Weizmann Institute of Science, 1995.
-
(1995)
-
-
Canetti, R.1
-
19
-
-
0034447081
-
Composition and integrity preservation of secure reactive systems
-
Gritzalis D, Jajodia S, eds. New York: ACM Press
-
Pfitzmann B, Waidner M. Composition and integrity preservation of secure reactive systems. In: Gritzalis D, Jajodia S, eds. Proc. of the 7th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2000. 245-254.
-
(2000)
Proc. of the 7th ACM Conf. on Computer and Communications Security
, pp. 245-254
-
-
Pfitzmann, B.1
Waidner, M.2
-
20
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
[doi: 10.1007/s001450010003]
-
Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3):361-396. [doi: 10.1007/s001450010003]
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
|