-
2
-
-
50349083227
-
PAR: Payment for anonymous routing
-
Borisov, N., Goldberg, I. (eds.), LNCS, Springer, Heidelberg
-
Androulaki, E., Raykova, M., Srivatsan, S., Stavrou, A., Bellovin, S.M.: PAR: Payment for Anonymous Routing. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 219-236. Springer, Heidelberg (2008)
-
(2008)
PETS 2008
, vol.5134
, pp. 219-236
-
-
Androulaki, E.1
Raykova, M.2
Srivatsan, S.3
Stavrou, A.4
Bellovin, S.M.5
-
4
-
-
54249122250
-
Practical anonymous divisible e-cash from bounded accumulators
-
Tsudik, G. (ed.), LNCS, Springer, Heidelberg
-
Au, M.H., Susilo, W., Mu, Y.: Practical Anonymous Divisible E-Cash from Bounded Accumulators. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 287-301. Springer, Heidelberg (2008)
-
(2008)
FC 2008
, vol.5143
, pp. 287-301
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
5
-
-
24944435537
-
Compact e-cash
-
Cramer, R. (ed.), LNCS, Springer, Heidelberg
-
Camenisch, J.L., Hohenberger, S., Lysyanskaya, A.: Compact E-Cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005
, vol.3494
, pp. 302-321
-
-
Camenisch, J.L.1
Hohenberger, S.2
Lysyanskaya, A.3
-
6
-
-
35248839965
-
A signature scheme with efficient protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.), LNCS, Springer, Heidelberg
-
Camenisch, J.L., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
SCN 2002
, vol.2576
, pp. 268-289
-
-
Camenisch, J.L.1
Lysyanskaya, A.2
-
7
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.), LNCS, Springer, Heidelberg
-
Camenisch, J.L., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004
, vol.3152
, pp. 56-72
-
-
Camenisch, J.L.1
Lysyanskaya, A.2
-
8
-
-
0001604533
-
Blind signatures for untraceable payments
-
Plenum Press
-
Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO, pp. 199-203. Plenum Press (1982)
-
(1982)
CRYPTO
, pp. 199-203
-
-
Chaum, D.1
-
9
-
-
77954327465
-
-
Tech. Rep. UCB/EECS-2010-5, University of California, Berkeley
-
Chen, Y., Paxson, V., Katz, R.H.: What's New About Cloud Computing Security? Tech. Rep. UCB/EECS-2010-5, University of California, Berkeley (2010)
-
(2010)
What's New about Cloud Computing Security?
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
10
-
-
74049096633
-
XPay: Practical anonymous payments for Tor routing and other networked services
-
ACM
-
Chen, Y., Sion, R., Carbunar, B.: XPay: Practical Anonymous Payments for Tor Routing and other Networked Services. In: WPES, pp. 41-50. ACM (2009)
-
(2009)
WPES
, pp. 41-50
-
-
Chen, Y.1
Sion, R.2
Carbunar, B.3
-
12
-
-
80053583560
-
Implementation aspects of anonymous credential systems for mobile trusted platforms
-
De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.), LNCS, Springer, Heidelberg
-
Dietrich, K., Winter, J., Luzhnica, G., Podesser, S.: Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.) CMS 2011. LNCS, vol. 7025, pp. 45-58. Springer, Heidelberg (2011)
-
(2011)
CMS 2011
, vol.7025
, pp. 45-58
-
-
Dietrich, K.1
Winter, J.2
Luzhnica, G.3
Podesser, S.4
-
13
-
-
85084161366
-
Tor: The second-generation onion router
-
Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The Second-Generation Onion Router. In: USENIX Security Symposium, pp. 303-320 (2004)
-
(2004)
USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
14
-
-
84857078897
-
Oblivious outsourced storage with delegation
-
Danezis, G. (ed.), LNCS, Springer, Heidelberg
-
Franz, M., Williams, P., Carbunar, B., Katzenbeisser, S., Peter, A., Sion, R., Sotakova, M.: Oblivious Outsourced Storage with Delegation. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 127-140. Springer, Heidelberg (2012)
-
(2012)
FC 2011
, vol.7035
, pp. 127-140
-
-
Franz, M.1
Williams, P.2
Carbunar, B.3
Katzenbeisser, S.4
Peter, A.5
Sion, R.6
Sotakova, M.7
-
16
-
-
84864253936
-
Dynamics of a trusted platform: A building block approach
-
Grawrock, D.: Dynamics of a Trusted Platform: A Building Block Approach. Intel Press (2009)
-
(2009)
Intel Press
-
-
Grawrock, D.1
-
19
-
-
84864253937
-
Dynamic accumulator based discretionary access control for outsourced storage with unlinkable access
-
Springer
-
Slamanig, D.: Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access. In: Financial Cryptography and Data Security. Springer (2012)
-
(2012)
Financial Cryptography and Data Security
-
-
Slamanig, D.1
-
20
-
-
84857773390
-
Efficient schemes for anonymous yet authorized and bounded use of cloud resources
-
Miri, A., Vaudenay, S. (eds.), LNCS, Springer, Heidelberg
-
Slamanig, D.: Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 73-91. Springer, Heidelberg (2012)
-
(2012)
SAC 2011
, vol.7118
, pp. 73-91
-
-
Slamanig, D.1
-
21
-
-
82055200280
-
AcTvSM: A dynamic virtualization platform for enforcement of application integrity
-
Chen, L., Yung, M. (eds.), LNCS, Springer, Heidelberg
-
Toegl, R., Pirker, M., Gissing, M.: acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 326-345. Springer, Heidelberg (2011)
-
(2011)
INTRUST 2010
, vol.6802
, pp. 326-345
-
-
Toegl, R.1
Pirker, M.2
Gissing, M.3
-
23
-
-
85037135907
-
Lightweight anonymous authentication with TLS and DAA for embedded mobile devices
-
Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.), LNCS, Springer, Heidelberg
-
Wachsmann, C., Chen, L., Dietrich, K., Löhr, H., Sadeghi, A.-R., Winter, J.: Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 84-98. Springer, Heidelberg (2011)
-
(2011)
ISC 2010
, vol.6531
, pp. 84-98
-
-
Wachsmann, C.1
Chen, L.2
Dietrich, K.3
Löhr, H.4
Sadeghi, A.-R.5
Winter, J.6
-
24
-
-
84864253935
-
A flexible software development and emulation framework for ARM TrustZone
-
Springer
-
Wiegele, P., Winter, J., Pirker, M., Toegl, R.: A flexible software development and emulation framework for ARM TrustZone. In: Proceedings of The Third International Conference on Trusted Systems (INTRUST 2011). Springer (2012)
-
(2012)
Proceedings of the Third International Conference on Trusted Systems (INTRUST 2011)
-
-
Wiegele, P.1
Winter, J.2
Pirker, M.3
Toegl, R.4
-
25
-
-
84861447765
-
A hijacker's guide to the LPC bus
-
Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds.), LNCS, Springer, Heidelberg
-
Winter, J., Dietrich, K.: A Hijacker's Guide to the LPC Bus. In: Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds.) EuroPKI 2011. LNCS, vol. 7163, pp. 176-193. Springer, Heidelberg (2012)
-
(2012)
EuroPKI 2011
, vol.7163
, pp. 176-193
-
-
Winter, J.1
Dietrich, K.2
|