-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure coalition-resistant group signature scheme," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 1880. Berlin, Germany: Springer-Verlag, 2000, pp. 255-270.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
D. Boneh and X. Boyen, "Short signatures without random oracles and the SDH assumption in bilinear groups," J. Cryptol., vol. 21, no. 2, pp. 149-177, 2008.
-
(2008)
J. Cryptol.
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
35048887476
-
Short group signatures
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3152. Berlin, Germany: Springer-Verlag, 2004, pp. 41-55.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
4
-
-
14844295011
-
Direct anonymous attestation
-
E. Brickell, J. Camenisch, and L. Chen, "Direct anonymous attestation," in Proc. ACM CCS, 2004, pp. 132-145.
-
Proc. ACM CCS, 2004
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
5
-
-
74049125197
-
Anonymous credentials on a standard java card
-
P. Bichsel, J. Camenisch, T. Grosß, and V. Shoup, "Anonymous credentials on a standard java card," in Proc. ACM CCS, 2009, pp. 600-610.
-
Proc. ACM CCS, 2009
, pp. 600-610
-
-
Bichsel, P.1
Camenisch, J.2
Grosß, T.3
Shoup, V.4
-
6
-
-
70349608477
-
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings
-
E. Brickell, L. Chen, and J. Li, "Simplified security notions of direct anonymous attestation and a concrete scheme from pairings," Int. J. Inf. Security, vol. 8, no. 5, pp. 315-330, 2009.
-
(2009)
Int. J. Inf. Security
, vol.8
, Issue.5
, pp. 315-330
-
-
Brickell, E.1
Chen, L.2
Li, J.3
-
7
-
-
77958065231
-
Get shorty via group signatures without encryption
-
Berlin, Germany: Springer-Verlag
-
P. Bichsel, J. Camenisch, G. Neven, B. Warinschi, and N. P. Smart, "Get shorty via group signatures without encryption," in Security and Cryptography for Networks. Berlin, Germany: Springer-Verlag, 2010, pp. 381-398.
-
(2010)
Security and Cryptography for Networks
, pp. 381-398
-
-
Bichsel, P.1
Camenisch, J.2
Neven, G.3
Warinschi, B.4
Smart, N.P.5
-
8
-
-
52149109136
-
Expressive subgroup signatures
-
Security and Cryptography for Networks Berlin, Germany: Springer-Verlag
-
X. Boyen and C. Delerablee, "Expressive subgroup signatures," in Security and Cryptography for Networks (Lecture Notes in Computer Science), vol. 5229. Berlin, Germany: Springer-Verlag, 2008, pp. 185-200.
-
(2008)
Lecture Notes in Computer Science
, vol.5229
, pp. 185-200
-
-
Boyen, X.1
Delerablee, C.2
-
10
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2656. Berlin, Germany: Springer-Verlag, 2003, pp. 614-629.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
11
-
-
79959853254
-
Relations among privacy notions
-
J.-M. Bohli and A. Pashalidis, "Relations among privacy notions," ACM Trans. Inf. Syst. Security, vol. 14, no. 1, 2011, Art. ID 4.
-
(2011)
ACM Trans. Inf. Syst. Security
, vol.14
, Issue.1
-
-
Bohli, J.-M.1
Pashalidis, A.2
-
12
-
-
24144477851
-
Foundations of group signatures: The case of dynamic groups
-
Topics in Cryptology Berlin, Germany: Springer-Verlag
-
M. Bellare, H. Shi, and C. Zang, "Foundations of group signatures: The case of dynamic groups," in Topics in Cryptology (Lecture Notes in Computer Science), vol. 3376. Berlin, Germany: Springer-Verlag, 2004, pp. 136-153.
-
(2004)
Lecture Notes in Computer Science
, vol.3376
, pp. 136-153
-
-
Bellare, M.1
Shi, H.2
Zang, C.3
-
13
-
-
14844309671
-
Group signatures with verifier-local revocation
-
D. Boneh and H. Shacham, "Group signatures with verifier-local revocation," in Proc. ACM CCS, 2004, pp. 168-177.
-
Proc. ACM CCS, 2004
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
14
-
-
33746042155
-
Compact group signatures without random oracles
-
Berlin, Germany: Springer-Verlag
-
X. Boyen and B. Waters, "Compact group signatures without random oracles," in Advances in Cryptology, vol. 4004. Berlin, Germany: Springer-Verlag, 2006, pp. 427-444.
-
(2006)
Advances in Cryptology
, vol.4004
, pp. 427-444
-
-
Boyen, X.1
Waters, B.2
-
15
-
-
37149007674
-
Full-domain subgroup hiding and constant-size group signatures
-
Berlin, Germany: Springer-Verlag
-
X. Boyen and B. Waters, "Full-domain subgroup hiding and constant-size group signatures," in Public Key Cryptography, vol. 4450. Berlin, Germany: Springer-Verlag, 2007, pp. 1-15.
-
(2007)
Public Key Cryptography
, vol.4450
, pp. 1-15
-
-
Boyen, X.1
Waters, B.2
-
16
-
-
70349292369
-
Efficient attributes for anonymous credentials
-
J. Camenisch and T. Groß, "Efficient attributes for anonymous credentials," in Proc. ACM CCS, 2004, pp. 345-356.
-
Proc. ACM CCS, 2004
, pp. 345-356
-
-
Camenisch, J.1
Groß, T.2
-
17
-
-
24944435537
-
Compact E-cash
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya, "Compact E-cash," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494. Berlin, Germany: Springer-Verlag, 2005, pp. 302-321.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
18
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
J. Camenisch and A. Lysyanskaya, "Dynamic accumulators and application to efficient revocation of anonymous credentials," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2442. Berlin, Germany: Springer-Verlag, 2002, pp. 61-76.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
19
-
-
33749000965
-
A general certification framework with applications to privacy-enhancing certificate infrastructures
-
Berlin, Germany: Springer-Verlag
-
J. Camenisch, D. Sommer, and R. Zimmermann, "A general certification framework with applications to privacy-enhancing certificate infrastructures," in Security and Privacy in Dynamic Environments. Berlin, Germany: Springer-Verlag, 2006.
-
(2006)
Security and Privacy in Dynamic Environments
-
-
Camenisch, J.1
Sommer, D.2
Zimmermann, R.3
-
20
-
-
29244444524
-
List signature schemes
-
Feb.
-
S. Canard, B. Schoenmakers, M. Stam, and J. Traoré, "List signature schemes," Discrete Appl. Math., vol. 154, no. 2, pp. 189-201, Feb. 2006.
-
(2006)
Discrete Appl. Math.
, vol.154
, Issue.2
, pp. 189-201
-
-
Canard, S.1
Schoenmakers, B.2
Stam, M.3
Traoré, J.4
-
21
-
-
85024290278
-
Group Signatures
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
D. Chaum and E. van Heyst, "Group Signatures," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 547. Berlin, Germany: Springer-Verlag, 1991, pp. 257-265.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
22
-
-
84889075587
-
Flexible and scalable digital signatures in TPM 2.0
-
L. Chen and J. Li, "Flexible and scalable digital signatures in TPM 2.0," in Proc. ACM CCS, 2013, pp. 37-48.
-
Proc. ACM CCS, 2013
, pp. 37-48
-
-
Chen, L.1
Li, J.2
-
23
-
-
33845243601
-
Short traceable signatures based on bilinear pairings
-
Advances in Information and Computer Security Berlin, Germany: Springer-Verlag
-
S. G. Choi, K. Park, and M. Yung, "Short traceable signatures based on bilinear pairings," in Advances in Information and Computer Security (Lecture Notes in Computer Science), vol. 4266. Berlin, Germany: Springer-Verlag, 2006, pp. 88-103.
-
(2006)
Lecture Notes in Computer Science
, vol.4266
, pp. 88-103
-
-
Choi, S.G.1
Park, K.2
Yung, M.3
-
24
-
-
84887308796
-
Escrowed linkability of ring signatures and its applications
-
Progress in Cryptology Berlin, Germany: Springer-Verlag
-
S. S. M. Chow, W. Susilo, and T. H. Yuen, "Escrowed linkability of ring signatures and its applications," in Progress in Cryptology (Lecture Notes in Computer Science), vol. 4341. Berlin, Germany: Springer-Verlag, 2006, pp. 175-192.
-
(2006)
Lecture Notes in Computer Science
, vol.4341
, pp. 175-192
-
-
Chow, S.S.M.1
Susilo, W.2
Yuen, T.H.3
-
25
-
-
84887276320
-
Dynamic fully anonymous short group signatures
-
Progress in Cryptology Berlin, Germany: Springer-Verlag
-
C. Delerablée and D. Pointcheval, "Dynamic fully anonymous short group signatures," in Progress in Cryptology (Lecture Notes in Computer Science), vol. 4341. Berlin, Germany: Springer-Verlag, 2006, pp. 193-210.
-
(2006)
Lecture Notes in Computer Science
, vol.4341
, pp. 193-210
-
-
Delerablée, C.1
Pointcheval, D.2
-
26
-
-
38149112556
-
Attacking unlinkability: The importance of context
-
Privacy Enhancing Technologies Berlin, Germany: Springer-Verlag
-
M. Franz, B. Meyer, and A. Pashalidis, "Attacking unlinkability: The importance of context," in Privacy Enhancing Technologies (Lecture Notes in Computer Science), vol. 4776. Berlin, Germany: Springer-Verlag, 2007, pp. 1-16.
-
(2007)
Lecture Notes in Computer Science
, vol.4776
, pp. 1-16
-
-
Franz, M.1
Meyer, B.2
Pashalidis, A.3
-
27
-
-
84946827596
-
Threshold cryptosystems secure against chosen-ciphertext attacks
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
P.-A. Fouque and D. Pointcheval, "Threshold cryptosystems secure against chosen-ciphertext attacks," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2248. Berlin, Germany: Springer-Verlag, 2001, pp. 351-368.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 351-368
-
-
Fouque, P.-A.1
Pointcheval, D.2
-
28
-
-
34547358080
-
-
Cambridge, U.K.: Cambridge Univ. Press, ch. 9
-
I. F. Blake, G. Seroussi, and N. P. Smart, Advances in Elliptic Curve Cryptography, vol. 317. Cambridge, U.K.: Cambridge Univ. Press, 2005, ch. 9, pp. 183-213.
-
(2005)
Advances in Elliptic Curve Cryptography
, vol.317
, pp. 183-213
-
-
Blake, I.F.1
Seroussi, G.2
Smart, N.P.3
-
29
-
-
78650842020
-
A group signature scheme from lattice assumptions
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
S. D. Gordon, J. Katz, and V. Vaikuntanathan, "A group signature scheme from lattice assumptions," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6477. Berlin, Germany: Springer-Verlag, 2010, pp. 395-412.
-
(2010)
Lecture Notes in Computer Science
, vol.6477
, pp. 395-412
-
-
Gordon, S.D.1
Katz, J.2
Vaikuntanathan, V.3
-
30
-
-
38149097733
-
Fully anonymous group signatures without random oracles
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
J. Groth, "Fully anonymous group signatures without random oracles," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 4833. Berlin, Germany: Springer-Verlag, 2007, pp. 164-180.
-
(2007)
Lecture Notes in Computer Science
, vol.4833
, pp. 164-180
-
-
Groth, J.1
-
31
-
-
48649088209
-
A group signature based secure and privacy-preserving vehicular communication framework
-
J. Guo, J. P. Baugh, and S. Wang, "A group signature based secure and privacy-preserving vehicular communication framework," in Proc. Mobile Netw. Veh. Environ., May 2007, pp. 103-108.
-
Proc. Mobile Netw. Veh. Environ., May 2007
, pp. 103-108
-
-
Guo, J.1
Baugh, J.P.2
Wang, S.3
-
33
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
D. Hughes and V. Shmatikov, "Information hiding, anonymity and privacy: A modular approach," J. Comput. Secur., vol. 12, no. 1, pp. 3-36, 2004.
-
(2004)
J. Comput. Secur.
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
34
-
-
79955905005
-
Short group signatures with controllable linkability
-
J. Y. Hwang, S. Lee, B.-H. Chung, H. S. Cho, and D. Nyang, "Short group signatures with controllable linkability," in Proc. LightSec, Mar. 2011, pp. 44-52.
-
Proc. LightSec, Mar. 2011
, pp. 44-52
-
-
Hwang, J.Y.1
Lee, S.2
Chung, B.-H.3
Cho, H.S.4
Nyang, D.5
-
35
-
-
84870064630
-
Group signatures with controllable linkability for dynamic membership
-
Feb.
-
J. Y. Hwang, S. Lee, B.-H. Chung, H. S. Cho, and D. Nyang, "Group signatures with controllable linkability for dynamic membership," Inf. Sci., vol. 222, pp. 761-778, Feb. 2013.
-
(2013)
Inf. Sci.
, vol.222
, pp. 761-778
-
-
Hwang, J.Y.1
Lee, S.2
Chung, B.-H.3
Cho, H.S.4
Nyang, D.5
-
36
-
-
50049096014
-
Fair blind signatures revisited
-
Pairing-Based Cryptography Berlin, Germany: Springer-Verlag
-
E. Hufschmitt and J. Traoré, "Fair blind signatures revisited," in Pairing-Based Cryptography (Lecture Notes in Computer Science), vol. 4575. Berlin, Germany: Springer-Verlag, 2007, pp. 268-292.
-
(2007)
Lecture Notes in Computer Science
, vol.4575
, pp. 268-292
-
-
Hufschmitt, E.1
Traoré, J.2
-
38
-
-
24944524118
-
Group signatures with efficient concurrent join
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
A. Kiayias and M. Yung, "Group signatures with efficient concurrent join," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494. Berlin, Germany: Springer-Verlag, 2005, pp. 198-214.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 198-214
-
-
Kiayias, A.1
Yung, M.2
-
39
-
-
35048841283
-
Traceable signatures
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
A. Kiayias, Y. Tsiounis, and M. Yung, "Traceable signatures," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3027. Berlin, Germany: Springer-Verlag, 2004, pp. 571-589.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
40
-
-
84928104876
-
Lattice-based group signature scheme with verifier-local revocation
-
Public-Key Cryptography Berlin, Germany: Springer-Verlag
-
A. Langlois, S. Ling, K. Nguyen, and H. Wang, "Lattice-based group signature scheme with verifier-local revocation," in Public-Key Cryptography (Lecture Notes in Computer Science), vol. 4833. Berlin, Germany: Springer-Verlag, 2007, pp. 164-180.
-
(2007)
Lecture Notes in Computer Science
, vol.4833
, pp. 164-180
-
-
Langlois, A.1
Ling, S.2
Nguyen, K.3
Wang, H.4
-
41
-
-
35048825874
-
Linkable spontaneous anonymous group signature for ad hoc groups
-
Information Security and Privacy Berlin, Germany: Springer-Verlag
-
J. K. Liu, V. K. Wei, and D. S. Wong, "Linkable spontaneous anonymous group signature for ad hoc groups," in Information Security and Privacy (Lecture Notes in Computer Science), vol. 3108. Berlin, Germany: Springer-Verlag, 2004, pp. 325-335.
-
(2004)
Lecture Notes in Computer Science
, vol.3108
, pp. 325-335
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
42
-
-
79751538351
-
Efficient traceable signatures in the standard model
-
Mar.
-
B. Libert and M. Yung, "Efficient traceable signatures in the standard model," Theoretical Comput. Sci., vol. 412, nos. 12-14, pp. 1220-1242, Mar. 2011.
-
(2011)
Theoretical Comput. Sci.
, vol.412
, Issue.12-14
, pp. 1220-1242
-
-
Libert, B.1
Yung, M.2
-
43
-
-
34247385140
-
Democratic group signatures: On an example of joint ventures
-
M. Manulis, "Democratic group signatures: On an example of joint ventures," in Proc. ASIACCS, 2006, pp. 365-201.
-
Proc. ASIACCS, 2006
, pp. 365-1201
-
-
Manulis, M.1
-
44
-
-
33745600128
-
Linkable democratic group signatures
-
Information Security Practice and Experience Berlin, Germany: Springer-Verlag
-
M. Manulis, A.-R. Sadeghi, and J. Schwenk, "Linkable democratic group signatures," in Information Security Practice and Experience (Lecture Notes in Computer Science), vol. 3903. Berlin, Germany: Springer-Verlag, 2006, pp. 187-201.
-
(2006)
Lecture Notes in Computer Science
, vol.3903
, pp. 187-201
-
-
Manulis, M.1
Sadeghi, A.-R.2
Schwenk, J.3
-
45
-
-
33746100516
-
Cryptography from pairings
-
Cambridge, U.K.: Cambridge Univ. Press, ch. 10
-
K. G. Paterson, "Cryptography from pairings," in Advances in Elliptic Curve Cryptography, vol. 317. Cambridge, U.K.: Cambridge Univ. Press, 2005, ch. 10, pp. 215-251.
-
(2005)
Advances in Elliptic Curve Cryptography
, vol.317
, pp. 215-251
-
-
Paterson, K.G.1
-
46
-
-
84987607367
-
-
Available: accessed Jun. 2014
-
PBC Library. [Online]. Available: http://crypto.stanford.edu/pbc, accessed Jun. 2014.
-
PBC Library. [Online]
-
-
-
47
-
-
80051488947
-
Pairing-friendly curves with minimal security loss by Cheon's algorithm
-
C.-M. Park and H.-S. Lee, "Pairing-friendly curves with minimal security loss by Cheon's algorithm," ETRI J., vol. 33, no. 4, pp. 656-659, 2011.
-
(2011)
ETRI J.
, vol.33
, Issue.4
, pp. 656-659
-
-
Park, C.-M.1
Lee, H.-S.2
-
48
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," J. Cryptol., vol. 13, no. 3, pp. 361-369, 2000.
-
(2000)
J. Cryptol.
, vol.13
, Issue.3
, pp. 361-369
-
-
Pointcheval, D.1
Stern, J.2
-
49
-
-
77956735087
-
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
-
Sep.
-
Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications," IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3589-3603, Sep. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.7
, pp. 3589-3603
-
-
Sun, Y.1
Lu, R.2
Lin, X.3
Shen, X.4
Su, J.5
-
50
-
-
47949086407
-
An ID-based framework achieving privacy and non-repudiation in vehicular ad hoc networks
-
J. Sun, C. Zhang, and Y. Fang, "An ID-based framework achieving privacy and non-repudiation in vehicular ad hoc networks," in Proc. IEEE Military Commun. Conf., Oct. 2007, pp. 1-7.
-
Proc. IEEE Military Commun. Conf., Oct. 2007
, pp. 1-7
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
51
-
-
24644503853
-
Separable linkable threshold ring signatures
-
Progress in Cryptology Berlin, Germany: Springer-Verlag
-
P. P. Tsang, V. K. Wei, T. K. Chan, M. H. Au, J. K. Liu, and D. S. Wong, "Separable linkable threshold ring signatures," in Progress in Cryptology (Lecture Notes in Computer Science), vol. 3348. Berlin, Germany: Springer-Verlag, 2004, pp. 337-376.
-
(2004)
Lecture Notes in Computer Science
, vol.3348
, pp. 337-376
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Au, M.H.4
Liu, J.K.5
Wong, D.S.6
-
52
-
-
57049129831
-
An efficient message authentication scheme for vehicular communications
-
Nov.
-
C. Zhang, X. Lin, R. Lu, P.-H. Ho, and X. Shen, "An efficient message authentication scheme for vehicular communications," IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3357-3368, Nov. 2008.
-
(2008)
IEEE Trans. Veh. Technol.
, vol.57
, Issue.6
, pp. 3357-3368
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.-H.4
Shen, X.5
-
53
-
-
84928106756
-
-
Available: accessed Jun. 2014
-
TCG TPM V1.2 Specification. [Online]. Available: http://www.trustedcomputinggroup.org/resources/tpm-main-specification, accessed Jun. 2014.
-
TCG TPM V1.2 Specification. [Online]
-
-
-
54
-
-
0344628463
-
Accumulating composites and improved group signing
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
G. Tsudik and S. Xu, "Accumulating composites and improved group signing," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2894. Berlin, Germany: Springer-Verlag, 2003, pp. 269-286.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 269-286
-
-
Tsudik, G.1
Xu, S.2
-
55
-
-
0002433547
-
From data mining to knowledge discovery: An overview
-
Menlo Park, CA, USA: AAAI
-
U. M. Fayyad, G. Piatetsky-Shapiro, and P. Smyth, "From data mining to knowledge discovery: An overview," in Advances in Knowledge Discovery and Data Mining. Menlo Park, CA, USA: AAAI, 1996.
-
(1996)
Advances in Knowledge Discovery and Data Mining
-
-
Fayyad, U.M.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
56
-
-
33646002029
-
Tracing-by-linking group signatures
-
Information Security Berlin, Germany: Springer-Verlag
-
V. K. Wei, "Tracing-by-linking group signatures," in Information Security (Lecture Notes in Computer Science), vol. 3650. Berlin, Germany: Springer-Verlag, 2005, pp. 149-163.
-
(2005)
Lecture Notes in Computer Science
, vol.3650
, pp. 149-163
-
-
Wei, V.K.1
-
57
-
-
77249157951
-
Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications
-
Feb.
-
Q. Wu, J. Domingo-Ferrer, and U. Gonzalez-Nicolas, "Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 559-573, Feb. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.2
, pp. 559-573
-
-
Wu, Q.1
Domingo-Ferrer, J.2
Gonzalez-Nicolas, U.3
-
58
-
-
77249166657
-
Anonymous user communication for privacy protection in wireless metropolitan mesh networks
-
Feb.
-
Z. Wan, K. Ren, B. Zhu, B. Preneel, and M. Gu, "Anonymous user communication for privacy protection in wireless metropolitan mesh networks," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 519-532, Feb. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.2
, pp. 519-532
-
-
Wan, Z.1
Ren, K.2
Zhu, B.3
Preneel, B.4
Gu, M.5
|