A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The Rise of the Computer State
The Rise of the Computer State
Novel security techniques for online systems
Communications of the ACM
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Some variations on RSA signatures and their security
Proceedings on Advances in cryptology---CRYPTO '86
A secure and privacy-protecting protocol for transmitting personal information between organizations
Proceedings on Advances in cryptology---CRYPTO '86
Demonstrating that a public predicate can be satisfied without revealing any information about how
Proceedings on Advances in cryptology---CRYPTO '86
Information technology and dataveillance
Communications of the ACM
ACM SIGIR Forum
Anonymous and verifiable registration in databases
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A “paradoxical” identity-based signature scheme resulting from zero-knowledge
CRYPTO '88 Proceedings on Advances in cryptology
CRYPTO '88 Proceedings on Advances in cryptology
Communications of the ACM
Membership authentication for hierarchical multigroups using the extended Fiat-Shamir scheme
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Disposable zero-knowledge authentications and their applications to untraceable electronic cash
CRYPTO '89 Proceedings on Advances in cryptology
How convincing is your protocol?
ACM SIGACT News
NetCash: a design for practical electronic currency on the Internet
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Providing location information in a ubiquitous computing environment (panel session)
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
Money in electronic commerce: digital cash, electronic fund transfer, and Ecash
Communications of the ACM
The Design and Implementation of a Secure Auction Service
IEEE Transactions on Software Engineering
An efficient fair payment system
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
Strong loss tolerance of electronic coin systems
ACM Transactions on Computer Systems (TOCS)
Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
Communications of the ACM
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 7th ACM conference on Computer and communications security
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Identity management based on P3P
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Communications of the ACM
Finite-state analysis of two contract signing protocols
Theoretical Computer Science
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
A framework for micropayment evaluation
Netnomics
How Much Do You Trust Big Brother?
IEEE Internet Computing
Privacy in browser-based attribute exchange
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
An Anomymous Fair Exchange E-commerce Protocol
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
An Equitably Fair On-line Auction Scheme
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Transactional Security for a Distributed Reputation Management System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Password Authentication Using Multiple Servers
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
An Internet Anonymous Auction Scheme
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Security Issues in M-Commerce: A Usage-Based Taxonomy
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
An Identity Escrow Scheme with Appointed Verifiers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Attacks on Some RSA Signatures
CRYPTO '85 Advances in Cryptology
A Natural Taxonomy for Digital Information Authentication Schemes
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
How To Break and Repair A "Provably Secure" Untraceable Payment System
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract)
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Divisible Electronic Cash Scheme
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Priced Oblivious Transfer: How to Sell Digital Goods
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
An Online, Transferable E-Cash Payment System
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Self-Blindable Credential Certificates from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Optimistic Trust with Realistic eNvestigators (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Multilateral Security: Enabling Technologies and Their Evaluation
Informatics - 10 Years Back. 10 Years Ahead.
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Anonymity without 'Cryptography'
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Anonymous Investing: Hiding the Identities of Stockholders
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Anonymous Authentication of Membership in Dynamic Groups
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Self-Escrowed Cash against User Blackmailing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Group Principals and the Formalization of Anonymity
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
An Improvement on a Practical Secret Voting Scheme
ISW '99 Proceedings of the Second International Workshop on Information Security
An Anonymous Loan System Based on Group Signature Scheme
ISC '02 Proceedings of the 5th International Conference on Information Security
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Secret Handshakes from Pairing-Based Key Agreements
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
ACM SIGecom Exchanges
Localized Credentials for Server Assisted Mobile Wallet
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
Teaching secure communication protocols using a game representation
ACE '03 Proceedings of the fifth Australasian conference on Computing education - Volume 20
Secure mediation: requirements, design, and architecture
Journal of Computer Security - IFIP 2000
Payment technologies for E-commerce
A peer-to-peer approach to wireless LAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
PayCash: a secure efficient Internet payment system
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
A secure and private system for subscription-based remote services
ACM Transactions on Information and System Security (TISSEC)
Electronic Commerce Research
Fine-grained control of security capabilities
ACM Transactions on Internet Technology (TOIT)
Anonymous authentication scheme for XML security standard with Refreshable Tokens
Proceedings of the 2003 ACM workshop on XML security
Proceedings of the 2003 workshop on New security paradigms
Proceedings of the 13th international conference on World Wide Web
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Towards a credential-based implementation of compound access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Anonymous credentials with biometrically-enforced non-transferability
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 11th ACM conference on Computer and communications security
An escrow electronic cash system with limited traceability
Information Sciences—Informatics and Computer Science: An International Journal
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Proceedings of the 2nd annual conference on Mid-south college computing
Anonymous traceable disclosure scheme using pairing over elliptic curve
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
A user-centric anonymous authorisation framework in e-commerce environment
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Blind sales in electronic commerce
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
A fuzzy reasoning scheme for context sharing decision making
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Policy-hiding access control in open environment
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Preventing attribute information leakage in automated trust negotiation
Proceedings of the 12th ACM conference on Computer and communications security
Automated trust negotiation using cryptographic credentials
Proceedings of the 12th ACM conference on Computer and communications security
Specifying electronic voting protocols in typed MSR
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Privacy and identity management for everyone
Proceedings of the 2005 workshop on Digital identity management
Managing privacy preferences for federated identity management
Proceedings of the 2005 workshop on Digital identity management
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Replica management should be a game
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
The advent of trusted computing: implications for digital forensics
Proceedings of the 2006 ACM symposium on Applied computing
Privacy-preserving demographic filtering
Proceedings of the 2006 ACM symposium on Applied computing
Specification of a framework for the anonymous use of privileges
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Nordic Journal of Computing - Selected papers of the 17th nordic workshop on programming theory (NWPT'05), October 19-21, 2005
Securing user inputs for the web
Proceedings of the second ACM workshop on Digital identity management
How to win the clonewars: efficient periodic n-times anonymous authentication
Proceedings of the 13th ACM conference on Computer and communications security
Deniable authentication and key exchange
Proceedings of the 13th ACM conference on Computer and communications security
OACerts: Oblivious Attribute Certificates
IEEE Transactions on Dependable and Secure Computing
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Data Anonymity in the FOO Voting Scheme
Electronic Notes in Theoretical Computer Science (ENTCS)
Concurrently-secure credential ownership proofs
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Journal of Computer Security
Establishing and protecting digital identity in federation systems
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Community support and identity management
ECSCW'01 Proceedings of the seventh conference on European Conference on Computer Supported Cooperative Work
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
PP-trust-X: A system for privacy preserving trust negotiations
ACM Transactions on Information and System Security (TISSEC)
On secure and pseudonymous client-relationships with multiple servers
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Smart cards in hostile environments
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Strongboxes for electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Token and notational money in electronic commerce
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Secure coprocessors in electronic commerce applications
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Building blocks for atomicity in electronic commerce
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A framework for building an electronic currency system
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Authentication without Identification
IEEE Security and Privacy
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Enhancing privacy in identity management systems
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Knowledge-based modelling of voting protocols
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
Vulnerabilities in Anonymous Credential Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
The SPARTA Pseudonym and Authorization System
Electronic Notes in Theoretical Computer Science (ENTCS)
Achieving simultaneous distribution control and privacy protection for Internet media delivery
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Notarized federated ID management and authentication
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
Flexible resource allocation and composition across gsm/3g networks and wlans
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control
Information Security and Cryptology
Privacy-Preserving Collaborative Social Networks
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Privacy-Preserving Collaborative E-Voting
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
A Privacy-Preserving Ticketing System
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
An Efficient Anonymous Credential System
Financial Cryptography and Data Security
Privacy Preserving Data Mining within Anonymous Credential Systems
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
VeryIDX - A Digital Identity Management System for Pervasive Computing Environments
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
Identity management throughout one's whole life
Information Security Tech. Report
Efficient attributes for anonymous credentials
Proceedings of the 15th ACM conference on Computer and communications security
CPG: closed pseudonymous groups
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Rethinking accountable privacy supporting services: extended abstract
Proceedings of the 4th ACM workshop on Digital identity management
Minimal information disclosure with efficiently verifiable credentials
Proceedings of the 4th ACM workshop on Digital identity management
Minimal credential disclosure in trust negotiations
Proceedings of the 4th ACM workshop on Digital identity management
Improving secure long-term archival of digitally signed documents
Proceedings of the 4th ACM international workshop on Storage security and survivability
The SPARTA pseudonym and authorization system
Science of Computer Programming
Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks
International Journal of Business Intelligence and Data Mining
Access with Fast Batch Verifiable Anonymous Credentials
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
An Open Framework for Remote Electronic Elections
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Analysis and Improvement of an Anonymity Scheme for P2P Reputation Systems
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Delegate predicate encryption and its application to anonymous authentication
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Privacy-preserving multi-dimensional credentialing using veiled certificates
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Preserving Privacy versus Data Retention
TAMC '09 Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Leak-free mediated group signatures
Journal of Computer Security
Near-field communication-based secure mobile payment service
Proceedings of the 11th International Conference on Electronic Commerce
Privacy now and in the age of ambient intelligence
International Journal of Electronic Security and Digital Forensics
Automated trust negotiation using cryptographic credentials
ACM Transactions on Information and System Security (TISSEC)
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
Technical challenges of network anonymity
Computer Communications
Specifying Privacy-Preserving Protocols in Typed MSR
Computer Standards & Interfaces
Oblivious transfer with access control
Proceedings of the 16th ACM conference on Computer and communications security
Anonymous credentials on a standard java card
Proceedings of the 16th ACM conference on Computer and communications security
XPay: practical anonymous payments for tor routing and other networked services
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Integration of a secure mobile payment system in a GSM/UMTS SIM smart card
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
Verifying Anonymous Credential Systems in Applied Pi Calculus
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Certificate-Free Attribute Authentication
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
StemCerts-2: pairs of X.509 v3 certificates for greater security, flexibility and convenience
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Static Validation of a Voting Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Private location-based information retrieval through user collaboration
Computer Communications
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Trustable Relays for Anonymous Communication
Transactions on Data Privacy
Vehicular telematics over heterogeneous wireless networks: A survey
Computer Communications
Efficient and privacy-preserving enforcement of attribute-based access control
Proceedings of the 9th Symposium on Identity and Trust on the Internet
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Some weaknesses of "weaknesses of undeniable signatures"
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
How to break another "provably secure" payment system
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Restrictive binding of secret-key certificates
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Blinding for unanticipated signatures
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Privacy-preserving credentials upon trusted computing augmented servers
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Privacy protection in PKIs: a separation-of-authority approach
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
E-voting without 'cryptography'
FC'02 Proceedings of the 6th international conference on Financial cryptography
Medical information privacy assurance: cryptographic and system aspects
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A provably secure blind signature scheme
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Using cryptography for privacy protection in data mining systems
WImBI'06 Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics
Anonymity 2.0 - X.509 extensions supporting privacy-friendly authentication
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Accredited symmetrically private information retrieval
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Attacking unlinkability: the importance of context
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
A model of onion routing with provable anonymity
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Mediator-free secure policy interoperation of exclusively-trusted multiple domains
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
A practical electronic payment scheme
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
P-signatures and noninteractive anonymous credentials
TCC'08 Proceedings of the 5th conference on Theory of cryptography
A card requirements language enabling privacy-preserving access control
Proceedings of the 15th ACM symposium on Access control models and technologies
Wireless Personal Communications: An International Journal
Multifactor identity verification using aggregated proof of knowledge
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Measuring the user's anonymity when disclosing personal properties
Proceedings of the 6th International Workshop on Security Measurements and Metrics
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Optimized query forgery for private information retrieval
IEEE Transactions on Information Theory
Anonymous authentication with TLS and DAA
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Solving revocation with efficient update of anonymous credentials
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Conditional e-payments with transferability
Journal of Parallel and Distributed Computing
Identity in the Information Society
Secure collaborative social networks
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Lightweight anonymous authentication with TLS and DAA for embedded mobile devices
ISC'10 Proceedings of the 13th international conference on Information security
Access controls for oblivious and anonymous systems
ACM Transactions on Information and System Security (TISSEC)
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Efficient attribute-based signatures for non-monotone predicates in the standard model
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Open research questions of privacy-enhanced event scheduling
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Privacy preservation with X.509 standard certificates
Information Sciences: an International Journal
Intrusion-tolerant fine-grained authorization for Internet applications
Journal of Systems Architecture: the EUROMICRO Journal
Digital privacy
Commuting signatures and verifiable encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
A soft computing approach for privacy requirements engineering: The PriS framework
Applied Soft Computing
A Proposal for a Privacy-preserving National Identity Card
Transactions on Data Privacy
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Pseudonymization service for X-road eGovernment data exchange layer
EGOVIS'11 Proceedings of the Second international conference on Electronic government and the information systems perspective
Oblivious transfer with complex attribute-based access control
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Analysis of revocation strategies for anonymous Idemix credentials
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
SPEcTRe: spot-checked private ecash tolling at roadside
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
FAUST: efficient, TTP-free abuse prevention by anonymous whitelisting
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Anonymous credentials from (indexed) aggregate signatures
Proceedings of the 7th ACM workshop on Digital identity management
Provably-secure electronic cash based on certificateless partially-blind signatures
Electronic Commerce Research and Applications
Federated identity-management protocols
Proceedings of the 11th international conference on Security Protocols
Notarized federated identity management for web services
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Multilateral security: enabling technologies and their evaluation
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Privacy with delegation of rights by identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Security analysis and fix of an anonymous credential system
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
A cryptographic framework for the controlled release of certified data
SP'04 Proceedings of the 12th international conference on Security Protocols
SP'04 Proceedings of the 12th international conference on Security Protocols
The dancing bear: a new way of composing ciphers
SP'04 Proceedings of the 12th international conference on Security Protocols
Privacy enhanced technologies: methods – markets – misuse
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Efficient Attributes for Anonymous Credentials
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
OACerts: oblivious attribute certificates
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
On the PET workshop panel “mix cascades versus peer-to-peer: is one concept superior?”
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Electronic voting: an all-purpose platform
EGOV'05 Proceedings of the 4th international conference on Electronic Government
How to securely outsource cryptographic computations
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
MobiCoin: digital cash for m-commerce
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
A formal treatment of onion routing
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
A restricted multi-show credential system and its application on e-voting
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A privacy preserving rental system
ISC'05 Proceedings of the 8th international conference on Information Security
Blind spontaneous anonymous group signatures for ad hoc groups
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Privacy for public transportation
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Towards a privacy-preserving national identity card
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
A protocol for anonymous and accurate e-polling
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
Auditable anonymous delegation
ICISS'05 Proceedings of the First international conference on Information Systems Security
Economics of identity management: a supply-side perspective
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
An agent infrastructure for privacy-enhancing agent-based e-commerce applications
AAMAS'11 Proceedings of the 10th international conference on Advanced Agent Technology
The challenges raised by the privacy-preserving identity card
Cryptography and Security
BNymble: more anonymous blacklisting at almost no cost (a short paper)
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Evoking comprehensive mental models of anonymous credentials
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Hierarchical ECC-Based RFID authentication protocol
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Block-wise p-signatures and non-interactive anonymous credentials with efficient attributes
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
MNPA: a mobile network privacy architecture
Computer Communications
Feature: Smart cards: The Authenticated Solution For E-business User
Network Security
Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Unification modulo synchronous distributivity
IJCAR'12 Proceedings of the 6th international joint conference on Automated Reasoning
Anonymous ticketing for NFC-Enabled mobile phones
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Efficient threshold zero-knowledge with applications to user-centric protocols
ICITS'12 Proceedings of the 6th international conference on Information Theoretic Security
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols
Proceedings of the 2012 ACM conference on Computer and communications security
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Domain-Specific pseudonymous signatures for the german identity card
ISC'12 Proceedings of the 15th international conference on Information Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reasoning about minimal anonymity in security protocols
Future Generation Computer Systems
Data-minimizing authentication goes mobile
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Proxy re-encryption in a privacy-preserving cloud computing DRM scheme
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
Unlinkable attribute-based credentials with practical revocation on smart-cards
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Privacy-preserving smart metering with regional statistics and personal enquiry services
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
A secure channel for attribute-based credentials: [short paper]
Proceedings of the 2013 ACM workshop on Digital identity management
Proceedings of the 2013 workshop on New security paradigms workshop
A privacy-friendly architecture for future cloud computing
International Journal of Grid and Utility Computing
Automated buyer profiling control based on human privacy attitudes
Electronic Commerce Research and Applications
Wireless Personal Communications: An International Journal
Strategies for avoiding preference profiling in agent-based e-commerce environments
Applied Intelligence
Hi-index | 48.37 |
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.