-
1
-
-
70349232274
-
CPG: Closed pseudonymous groups
-
ACM
-
Abbott, R.S., van der Horst, T.W., Seamons, K.E.: CPG: Closed Pseudonymous Groups. In: Proceedings of WPES 2008, pp. 55-64. ACM (2008)
-
(2008)
Proceedings of WPES 2008
, pp. 55-64
-
-
Abbott, R.S.1
Van Der Horst, T.W.2
Seamons, K.E.3
-
2
-
-
33749993205
-
Constant-size dynamic k-TAA
-
De Prisco, R., Yung, M. eds. LNCS Springer, Heidelberg
-
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111-125. Springer, Heidelberg (2006)
-
(2006)
SCN 2006
, vol.4116
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
3
-
-
84865584730
-
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
-
Au, M.H., Tsang, P.P., Kapadia, A.: PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. ACM Transactions on Information and System Security 14(4), 29 (2011)
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.4
, pp. 29
-
-
Au, M.H.1
Tsang, P.P.2
Kapadia, A.3
-
4
-
-
84868296920
-
BLACR: TTP-free blacklistable anonymous credentials with reputation
-
Au, M.H., Tsang, P.P., Kapadia, A., Susilo, W.: BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. Technical Report TR695, Indiana University Bloomington (2011)
-
(2011)
Technical Report TR695, Indiana University Bloomington
-
-
Au, M.H.1
Tsang, P.P.2
Kapadia, A.3
Susilo, W.4
-
5
-
-
85168123147
-
BLACR: TTP-free blacklistable anonymous credentials with reputation
-
Au, M.H., Kapadia, A., Susilo, W.: BLACR: TTP-free blacklistable anonymous credentials with reputation. In: Proceedings of NDSS 2012, ISOC (2012)
-
(2012)
Proceedings of NDSS 2012, ISOC
-
-
Au, M.H.1
Kapadia, A.2
Susilo, W.3
-
6
-
-
84869474722
-
PERM: Practical reputation-based blacklisting without TTPs
-
ACM
-
Au, M.H., Kapadia, A.: PERM: Practical reputation-based blacklisting without TTPs. In: Proceedings of CCS 2012, pp. 929-940. ACM (2012)
-
(2012)
Proceedings of CCS 2012
, pp. 929-940
-
-
Au, M.H.1
Kapadia, A.2
-
7
-
-
84863345554
-
Enhanced privacy ID: A direct anonymous attestation scheme with enhanced revocation capabilities
-
Brickell, E., Li, J.: Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities. IEEE Transactions on Dependable and Secure Computing 9(3), 345-360 (2012)
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 345-360
-
-
Brickell, E.1
Li, J.2
-
8
-
-
84958612917
-
Efficient group signature schemes for large groups (extended abstract)
-
Kaliski Jr., B.S. ed. LNCS Springer, Heidelberg
-
Camenisch, J.L., Stadler, M.A.: Efficient group signature schemes for large groups (extended abstract). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410-424. Springer, Heidelberg (1997)
-
(1997)
Crypto 1997
, vol.1294
, pp. 410-424
-
-
Camenisch, J.L.1
Stadler, M.A.2
-
9
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28(10), 1030-1044 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
10
-
-
85024290278
-
Group signatures
-
Davies, D.W. ed. LNCS Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
Eurocrypt 1991
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
11
-
-
84955571224
-
Access with pseudonyms
-
Dawson, E.P., Golíc, J.D. eds. LNCS Springer, Heidelberg
-
Chen, L.: Access with Pseudonyms. In: Dawson, E.P., Golíc, J.D. (eds.) Cryptography: Policy and Algorithms 1995. LNCS, vol. 1029, pp. 232-243. Springer, Heidelberg (1996)
-
(1996)
Cryptography: Policy and Algorithms 1995
, vol.1029
, pp. 232-243
-
-
Chen, L.1
-
12
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX
-
Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The Second-Generation Onion Router. In: Proceedings of USENIX Security 2004, SSYM 2004, vol. 12, p. 21. USENIX (2004)
-
(2004)
Proceedings of USENIX Security 2004, SSYM 2004
, vol.12
, pp. 21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
14
-
-
77955455561
-
Making a Nymbler Nymble using VERBS
-
Atallah, M.J., Hopper, N.J. eds. LNCS Springer, Heidelberg
-
Henry, R., Henry, K., Goldberg, I.: Making a Nymbler Nymble using VERBS. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 111-129. Springer, Heidelberg (2010)
-
(2010)
PETS 2010
, vol.6205
, pp. 111-129
-
-
Henry, R.1
Henry, K.2
Goldberg, I.3
-
15
-
-
80051954287
-
Formalizing anonymous blacklisting systems
-
Henry, R., Goldberg, I.: Formalizing anonymous blacklisting systems. In: Proceedings of IEEE S&P, pp. 81-95 (2011)
-
(2011)
Proceedings of IEEE S&P
, pp. 81-95
-
-
Henry, R.1
Goldberg, I.2
-
16
-
-
84888993079
-
Thinking Inside the BLAC Box: Smarter protocols Faster Anonymous Blacklisting
-
ACM
-
Henry, R., Goldberg, I.: Thinking Inside the BLAC Box: Smarter protocols Faster Anonymous Blacklisting. In: Proceedings of WPES 2013, pp. 71-82. ACM (2013)
-
(2013)
Proceedings of WPES 2013
, pp. 71-82
-
-
Henry, R.1
Goldberg, I.2
-
17
-
-
38049029638
-
Universal accumulators with efficient nonmembership proofs
-
Katz, J., Yung, M. eds. LNCS Springer, Heidelberg
-
Li, J., Li, N., Xue, R.: Universal Accumulators with Efficient Nonmembership Proofs. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 253-269. Springer, Heidelberg (2007)
-
(2007)
ACNS 2007
, vol.4521
, pp. 253-269
-
-
Li, J.1
Li, N.2
Xue, R.3
-
18
-
-
78650209785
-
Jack: Scalable accumulator-based nymble system
-
ACM
-
Lin, Z., Hopper, N.: Jack: Scalable Accumulator-based Nymble System. In: Proceedings of WPES 2010, pp. 53-62. ACM (2010)
-
(2010)
Proceedings of WPES 2010
, pp. 53-62
-
-
Lin, Z.1
Hopper, N.2
-
19
-
-
84857081450
-
BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)
-
Danezis, G. ed. LNCS Springer, Heidelberg
-
Lofgren, P., Hopper, N.: BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper). In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 268-275. Springer, Heidelberg (2012)
-
(2012)
FC 2011
, vol.7035
, pp. 268-275
-
-
Lofgren, P.1
Hopper, N.2
-
22
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Feigenbaum, J. ed. LNCS Springer, Heidelberg
-
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
-
(1992)
Crypto 1991
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
23
-
-
78651466222
-
Vulnerability of a Non-membership Proof Scheme
-
SciTePress
-
Peng, K., Bao, F.: Vulnerability of a Non-membership Proof Scheme. In: SECRYPT, pp. 419-422. SciTePress (2010)
-
(2010)
Secrypt
, pp. 419-422
-
-
Peng, K.1
Bao, F.2
-
24
-
-
85180530788
-
A contractual anonymity system
-
Schwartz, E.J., Brumley, D., McCune, J.M.: A Contractual Anonymity System. In: Proceedings of NDSS 2010, ISOC (2010)
-
(2010)
Proceedings of NDSS 2010, ISOC
-
-
Schwartz, E.J.1
Brumley, D.2
McCune, J.M.3
-
25
-
-
77952377083
-
Blacklistable anonymous credentials: Blocking misbehaving userswithout TTPs
-
ACM
-
Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: Blacklistable Anonymous Credentials: Blocking Misbehaving UsersWithout TTPs. In: Proceedings of CCS 2007, pp. 72-81. ACM (2007)
-
(2007)
Proceedings of CCS 2007
, pp. 72-81
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
26
-
-
70349290797
-
PEREA: Towards practical TTP-free revocation in anonymous authentication
-
ACM
-
Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: PEREA: Towards practical TTP-free revocation in anonymous authentication. In: Proceedings of CCS 2008, pp. 333-344. ACM (2008)
-
(2008)
Proceedings of CCS 2008
, pp. 333-344
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
27
-
-
78651408573
-
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
-
Tsang, P.P., Au, M.H., Kapadia, A., Smith, S.W.: BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Transactions on Information and System Security (TISSEC) 13(4) (2010)
-
(2010)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.4
-
-
Tsang, P.P.1
Au, M.H.2
Kapadia, A.3
Smith, S.W.4
-
28
-
-
78751656582
-
Nymble: Blocking misbehaving users in anonymizing networks
-
Tsang, P.P., Kapadia, A., Cornelius, C., Smith, S.W.: Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Transactions on Dependable and Secure Computing (TDSC) 8(2), 256-269 (2011)
-
(2011)
IEEE Transactions on Dependable and Secure Computing (TDSC)
, vol.8
, Issue.2
, pp. 256-269
-
-
Tsang, P.P.1
Kapadia, A.2
Cornelius, C.3
Smith, S.W.4
-
29
-
-
84865583485
-
PE(AR)2: Privacy-enhanced anonymous authentication with reputation and revocation
-
Foresti, S., Yung, M., Martinelli, F. eds. LNCS Springer, Heidelberg
-
Yu, K.Y., Yuen, T.H., Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: PE(AR)2: Privacy- Enhanced Anonymous Authentication with Reputation and Revocation. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 679-696. Springer, Heidelberg (2012)
-
(2012)
Esorics 2012
, vol.7459
, pp. 679-696
-
-
Yu, K.Y.1
Yuen, T.H.2
Chow, S.S.M.3
Yiu, S.M.4
Hui, L.C.K.5
|