-
2
-
-
0141559722
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO, 2000.
-
(2000)
CRYPTO
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
5
-
-
2642534257
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
M. Bellare, D. Micciancio, and B. Warinschi. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EUROCRYPT, 2003.
-
(2003)
EUROCRYPT
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
6
-
-
14844324877
-
Short signatures without random oracles
-
D. Boneh and X. Boyen. Short signatures without random oracles. In EUROCRYPT, 2004.
-
(2004)
EUROCRYPT
-
-
Boneh, D.1
Boyen, X.2
-
8
-
-
14844309671
-
Group signatures with verifier-local revocation
-
D. Boneh and H. Shacham. Group signatures with verifier-local revocation. In CCS, 2004.
-
(2004)
CCS
-
-
Boneh, D.1
Shacham, H.2
-
10
-
-
56649119348
-
Enhanced privacy ID: a direct anonymous attestation scheme with enhanced revocation capabilities
-
E. F. Brickell and J. Li. Enhanced privacy ID: a direct anonymous attestation scheme with enhanced revocation capabilities. In Workshop on Privacy in the Electronic Society, 2007.
-
(2007)
Workshop on Privacy in the Electronic Society
-
-
Brickell, E. F.1
Li, J.2
-
12
-
-
3543102859
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In CRYPTO, 2002.
-
(2002)
CRYPTO
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
24944577209
-
Signature schemes and anonymous credentials from bilinear maps
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO, 2004.
-
(2004)
CRYPTO
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
0002882557
-
Efficient group signature schemes for large groups (extended abstract)
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups (extended abstract). In CRYPTO, 1997.
-
(1997)
CRYPTO
-
-
Camenisch, J.1
Stadler, M.2
-
21
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, M. Norrish, R. Kolanski, T. Sewell, H. Tuch, and S. Win-wood. seL4: Formal verification of an OS kernel. In Proceedings of ACM SOSP, 2009.
-
(2009)
Proceedings of ACM SOSP
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Norrish, M.9
Kolanski, R.10
Sewell, T.11
Tuch, H.12
Win-wood, S.13
-
23
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In EuroSys, 2008.
-
(2008)
EuroSys
-
-
McCune, J. M.1
Parno, B.2
Perrig, A.3
Reiter, M. K.4
Isozaki, H.5
-
27
-
-
85077724590
-
Building a high-performance, programmable secure coprocessor
-
S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. In Computer Networks, 1998.
-
(1998)
Computer Networks
-
-
Smith, S. W.1
Weingart, S.2
-
28
-
-
85015263124
-
k-times anonymous authentication (extended abstract)
-
I. Teranishi, J. Furukawa, and K. Sako. k-times anonymous authentication (extended abstract). In ASIACRYPT, 2004.
-
(2004)
ASIACRYPT
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
29
-
-
85094767343
-
k-times anonymous authentication with a constant proving cost
-
I. Teranishi and K. Sako. k-times anonymous authentication with a constant proving cost. In Public Key Cryptography, 2006.
-
(2006)
Public Key Cryptography
-
-
Teranishi, I.1
Sako, K.2
-
31
-
-
77952377083
-
Blacklistable anonymous credentials: blocking misbehaving users without TTPs
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. Blacklistable anonymous credentials: blocking misbehaving users without TTPs. In CCS, 2007.
-
(2007)
CCS
-
-
Tsang, P. P.1
Au, M. H.2
Kapadia, A.3
Smith, S. W.4
-
32
-
-
85180416174
-
PEREA: towards practical TTP-free revocation in anonymous authentication
-
P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith. PEREA: towards practical TTP-free revocation in anonymous authentication. In CCS, 2008.
-
(2008)
CCS
-
-
Tsang, P. P.1
Au, M. H.2
Kapadia, A.3
Smith, S. W.4
-
33
-
-
28144436202
-
-
[Online]. Available: [Accessed: May 1, 2009]
-
D. A. Wheeler. Linux kernel 2.6: It’s worth more! [Online]. Available: http://www.dwheeler.com/essays/linux-kernel-cost.html. [Accessed: May 1, 2009].
-
Linux kernel 2.6: It’s worth more!
-
-
Wheeler, D. A.1
-
34
-
-
85180534024
-
-
XySSL Developers. [Online]. Available
-
XySSL Developers. XySSL cryptographic library. [Online]. Available: http://polarssl.org.
-
XySSL cryptographic library
-
-
|