-
1
-
-
84863469103
-
SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment
-
Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. Springer, Heidelberg
-
Chow, S.S.M., He, Y.-J., Hui, L.C.K., Yiu, S.M.: SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 526-543. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7341
, pp. 526-543
-
-
Chow, S.S.M.1
He, Y.-J.2
Hui, L.C.K.3
Yiu, S.M.4
-
2
-
-
67049119910
-
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Camenisch, J., Kohlweiss, M., Soriente, C.: An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 481-500. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 481-500
-
-
Camenisch, J.1
Kohlweiss, M.2
Soriente, C.3
-
3
-
-
78651408573
-
BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs
-
Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: BLAC: Revoking repeatedly misbehaving anonymous users without relying on TTPs. ACM Trans. Inf. Syst. Secur. 13(4), 39 (2010)
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.4
, pp. 39
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
4
-
-
56649119348
-
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
-
ACM
-
Brickell, E., Li, J.: Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities. In: WPES, pp. 21-30. ACM (2007)
-
(2007)
WPES
, pp. 21-30
-
-
Brickell, E.1
Li, J.2
-
5
-
-
84865584730
-
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
-
Au, M.H., Tsang, P.P., Kapadia, A.: PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. ACM Trans. Inf. Syst. Secur. 14(4), 29 (2011)
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, Issue.4
, pp. 29
-
-
Au, M.H.1
Tsang, P.P.2
Kapadia, A.3
-
6
-
-
84875252646
-
Constant-size dynamic k-times anonymous authentication
-
to appear
-
Au, M.H., Susilo,W., Mu, Y., Chow, S.S.M.: Constant-size dynamic k-times anonymous authentication. IEEE Systems Journal (to appear)
-
IEEE Systems Journal
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
Chow, S.S.M.4
-
7
-
-
78651466222
-
Vulnerability of a Non-membership Proof Scheme
-
SciTePress
-
Peng, K., Bao, F.: Vulnerability of a Non-membership Proof Scheme. In: SECRYPT, pp. 419-422. SciTePress (2010)
-
(2010)
SECRYPT
, pp. 419-422
-
-
Peng, K.1
Bao, F.2
-
8
-
-
38049029638
-
Universal Accumulators with Efficient Nonmembership Proofs
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Li, J., Li, N., Xue, R.: Universal Accumulators with Efficient Nonmembership Proofs. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 253-269. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 253-269
-
-
Li, J.1
Li, N.2
Xue, R.3
-
9
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618-644 (2007)
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
10
-
-
85168123147
-
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation
-
The Internet Society
-
Au, M.H., Kapadia, A., Susilo, W.: BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. In: NDSS. The Internet Society (2012)
-
(2012)
NDSS
-
-
Au, M.H.1
Kapadia, A.2
Susilo, W.3
-
11
-
-
35248839965
-
A Signature Scheme with Efficient Protocols
-
Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. Springer, Heidelberg
-
Camenisch, J.L., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268-289. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.L.1
Lysyanskaya, A.2
-
12
-
-
0009995540
-
th prime is greater than k(ln k + lnlnk - 1) for k ≥ 2
-
th prime is greater than k(ln k + lnlnk - 1) for k ≥ 2. Math. Comput. 68(225), 411-415 (1999)
-
(1999)
Math. Comput.
, vol.68
, Issue.225
, pp. 411-415
-
-
Dusart, P.1
-
13
-
-
38849115715
-
On schönhage's algorithm and subquadratic integer gcd computation
-
Möller, N.: On schönhage's algorithm and subquadratic integer gcd computation. Math. Comput. 77(261), 589-607 (2008)
-
(2008)
Math. Comput.
, vol.77
, Issue.261
, pp. 589-607
-
-
Möller, N.1
-
14
-
-
70549093018
-
Real Traceable Signatures
-
Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. Springer, Heidelberg
-
Chow, S.S.M.: Real Traceable Signatures. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 92-107. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5867
, pp. 92-107
-
-
Chow, S.S.M.1
|