Disposable zero-knowledge authentications and their applications to untraceable electronic cash
CRYPTO '89 Proceedings on Advances in cryptology
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Anonymous credentials with biometrically-enforced non-transferability
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
Vulnerabilities in Anonymous Credential Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control
Information Security and Cryptology
An Open Framework for Remote Electronic Elections
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Oblivious transfer with access control
Proceedings of the 16th ACM conference on Computer and communications security
WSEAS Transactions on Information Science and Applications
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Concurrently-secure blind signatures without random oracles or setup assumptions
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Privacy protection in PKIs: a separation-of-authority approach
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Medical information privacy assurance: cryptographic and system aspects
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Attacking unlinkability: the importance of context
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Nymble: anonymous IP-address blocking
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Equivocal blind signatures and adaptive UC-security
TCC'08 Proceedings of the 5th conference on Theory of cryptography
P-signatures and noninteractive anonymous credentials
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Measuring the user's anonymity when disclosing personal properties
Proceedings of the 6th International Workshop on Security Measurements and Metrics
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Privacy preservation with X.509 standard certificates
Information Sciences: an International Journal
Commuting signatures and verifiable encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Anonymous credentials from (indexed) aggregate signatures
Proceedings of the 7th ACM workshop on Digital identity management
A cryptographic framework for the controlled release of certified data
SP'04 Proceedings of the 12th international conference on Security Protocols
Concurrent blind signatures without random oracles
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Linking anonymous transactions: the consistent view attack
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Hi-index | 0.02 |