-
2
-
-
20544449100
-
The one-more-RSA-inversion problems and the security of chaum's blind signature scheme
-
DOI 10.1007/s00145-002-0120-1
-
M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The One-more-RSA-inversion problems and the security of Chaum's blind signature scheme. J. Cryptology, 16(3):185-215, 2003. (Pubitemid 41201209)
-
(2003)
Journal of Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
3
-
-
38149094079
-
A practical system for globally revoking the unlinkable pseudonyms of unknown users
-
J. Pieprzyk, H. Ghodosi, and E. Dawson, editors Springer
-
S. Brands, L. Demuynck, and B. D. Decker. A practical system for globally revoking the unlinkable pseudonyms of unknown users. In J. Pieprzyk, H. Ghodosi, and E. Dawson, editors, ACISP, volume 4586 of Lecture Notes in Computer Science, pages 400-415. Springer, 2007.
-
(2007)
ACISP, Volume 4586 of Lecture Notes in Computer Science
, pp. 400-415
-
-
Brands, S.1
Demuynck, L.2
Decker, B.D.3
-
4
-
-
56649119348
-
Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
-
New York, NY, USA ACM
-
E. Brickell and J. Li. Enhanced Privacy ID: a Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities. In WPES'07: Proceedings of the 2007 ACM workshop on Privacy in electronic society, pages 21-30, New York, NY, USA, 2007. ACM.
-
(2007)
WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society
, pp. 21-30
-
-
Brickell, E.1
Li, J.2
-
5
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
DOI 10.1145/4372.4373
-
D. Chaum. Security without identification: transaction systems to make Big Brother obsolete. Commun. ACM, 28(10):1030-1044, 1985. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum David1
-
7
-
-
85084161366
-
Tor: The second-generation onion router
-
Berkeley, CA, USA USENIX Association
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: the second-generation onion router. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
14
-
-
38149012971
-
Nymble: Anonymous IP-address blocking
-
Ottawa, Canada of LNCS Springer-Verlag, June
-
P. C. Johnson, A. Kapadia, P. P. Tsang, and S. W. Smith. Nymble: Anonymous IP-address blocking. In Proceedings of The Seventh International Symposium on Privacy Enhancing Technologies (PET), Ottawa, Canada, volume 4776 of LNCS, pages 113-133. Springer-Verlag, June 2007.
-
(2007)
Proceedings of the Seventh International Symposium on Privacy Enhancing Technologies (PET)
, vol.4776
, pp. 113-133
-
-
Johnson, P.C.1
Kapadia, A.2
Tsang, P.P.3
Smith, S.W.4
-
18
-
-
77950510574
-
Creating, destroying, and restoring value in wikipedia
-
ACM
-
R. Priedhorsky, J. Chen, S. Lam, K. Panciera, L. Terveen, and J. Riedl. Creating, destroying, and restoring value in Wikipedia. In Proceedings of the 2007 international ACM conference on Supporting group work, pages 259-268. ACM, 2007.
-
(2007)
Proceedings of the 2007 International ACM Conference on Supporting Group Work
, pp. 259-268
-
-
Priedhorsky, R.1
Chen, J.2
Lam, S.3
Panciera, K.4
Terveen, L.5
Riedl, J.6
-
19
-
-
0005072366
-
Unlinkable serial transactions: Protocols and applications
-
S. Stubblebine, P. Syverson, and D. Goldschlag. Unlinkable serial transactions: protocols and applications. ACM Transactions on Information and System Security (TISSEC), 2(4):354-389, 1999.
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.4
, pp. 354-389
-
-
Stubblebine, S.1
Syverson, P.2
Goldschlag, D.3
-
20
-
-
79251555651
-
Efficient computationally private information retrieval from anonymity or trapdoor groups
-
M. Burmester, G. Tsudik, S. S. Magliveras, and I. Ilic, editors Springer
-
J. T. Trostle and A. Parrish. Efficient computationally private information retrieval from anonymity or trapdoor groups. In M. Burmester, G. Tsudik, S. S. Magliveras, and I. Ilic, editors, ISC 10: Proceedings of the Information Security Conference, volume 6531 of Lecture Notes in Computer Science, pages 114-128. Springer, 2010.
-
(2010)
ISC 10: Proceedings of the Information Security Conference, Volume 6531 of Lecture Notes in Computer Science
, pp. 114-128
-
-
Trostle, J.T.1
Parrish, A.2
-
21
-
-
77952377083
-
Blacklistable anonymous credentials: Blocking misbehaving users without TTPs
-
New York, NY, USA ACM
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. Blacklistable Anonymous Credentials: blocking misbehaving users without TTPs. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 72-81, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 72-81
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
22
-
-
70349290797
-
PEREA: Towards practical TTP-free revocation in anonymous authentication
-
ACM
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. PEREA: Towards practical TTP-free revocation in anonymous authentication. In CCS'08: Proceedings of the 14th ACM conference on Computer and communications security, pages 333-344. ACM, 2008.
-
(2008)
CCS'08: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 333-344
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
23
-
-
78651408573
-
BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs
-
December
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs. ACM Trans. Inf. Syst. Secur., 13:39:1-39:33, December 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, pp. 391-3933
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
|