Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms
Scalable multicast security in dynamic groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Anonymous authentication with subset queries (extended abstract)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Enhancing privacy and trust in electronic communities
Proceedings of the 1st ACM conference on Electronic commerce
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
Practical forward secure group signature schemes
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A group signature scheme with strong separability
Journal of Systems and Software
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Using Compatible Keys for Secure Multicasting in E-Commerce
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
A Practical English Auction with One-Time Registration
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Anonymous Statistical Survey of Attributes
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Attacks Based on Small Factors in Various Group Structures
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Co-operatively Formed Group Signatures
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
A Group Signature Scheme Committing the Group
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
An Internet Anonymous Auction Scheme
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Efficient and Secure Member Deletion in Group Signature Schemes
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Separability and Efficiency for Generic Group Signature Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Optimistic Fair Secure Computation
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
An Identity Escrow Scheme with Appointed Verifiers
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Threshold Ring Signatures and Applications to Ad-hoc Groups
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Anonymity Control in Multi-bank E-Cash System
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Efficient Public Auction with One-Time Registration and Public Verifiability
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
A Group Signature Scheme with Improved Efficiency
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient Anonymous Fingerprinting with Group Signatures
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Towards Signature-Only Signature Schemes
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Unconditionally Secure Anonymous Encryption and Group Authentication
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Non-interactive Private Auctions
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Anonymous Authentication of Membership in Dynamic Groups
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Some Open Issues and New Directions in Group Signatures
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Resource-Efficient Anonymous Group Identification
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Unlinkable Electronic Coupon Protocol with Anonymity Control
ISW '99 Proceedings of the Second International Workshop on Information Security
Undeniable Confirmer Signature
ISW '99 Proceedings of the Second International Workshop on Information Security
Unlinkable Divisible Electronic Cash
ISW '00 Proceedings of the Third International Workshop on Information Security
Efficient Transferable Cash with Group Signatures
ISC '01 Proceedings of the 4th International Conference on Information Security
Traceability Schemes for Signed Documents
ISC '02 Proceedings of the 5th International Conference on Information Security
A New Offline Privacy Protecting E-cash System with Revokable Anonymity
ISC '02 Proceedings of the 5th International Conference on Information Security
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications
ISC '02 Proceedings of the 5th International Conference on Information Security
A Distributed and Computationally Secure Key Distribution Scheme
ISC '02 Proceedings of the 5th International Conference on Information Security
Efficient Revocation in Group Signatures
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
RSA Key Generation with Verifiable Randomness
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Robust and Secure Broadcasting
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Secret Handshakes from Pairing-Based Key Agreements
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Anonymous Membership Broadcast Schemes
Designs, Codes and Cryptography
Anonymous credentials with biometrically-enforced non-transferability
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Proceedings of the 11th ACM conference on Computer and communications security
A public auction scheme based on group signature
InfoSecu '04 Proceedings of the 3rd international conference on Information security
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Cryptanalysis of Xia-You group signature scheme
Journal of Systems and Software - Special issue: Software engineering education and training
Coercion-resistant electronic elections
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Ring signatures without random oracles
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Authentication and integrity in outsourced databases
ACM Transactions on Storage (TOS)
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security
Proceedings of the 5th ACM workshop on Privacy in electronic society
How to win the clonewars: efficient periodic n-times anonymous authentication
Proceedings of the 13th ACM conference on Computer and communications security
Practical private data matching deterrent to spoofing attacks
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
Insider attacks on multi-proxy multi-signature schemes
Computers and Electrical Engineering
Implementing group signature schemes with smart cards
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
A secure double auction protocol against false bids
Decision Support Systems
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Receipt management- transaction history based trust establishment
Proceedings of the 2007 ACM workshop on Digital identity management
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Proceedings of the 14th ACM conference on Computer and communications security
ID-based fair off-line electronic cash system with multiple banks
Journal of Computer Science and Technology
Secure scalable group signature with dynamic joins and separable authorities
International Journal of Security and Networks
Online subscriptions with anonymous access
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Efficient designated confirmer signature from bilinear pairings
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Simulatable Adaptive Oblivious Transfer
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
Universal Accumulators with Efficient Nonmembership Proofs
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A New Direct Anonymous Attestation Scheme from Bilinear Maps
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Unlinkable Randomizable Signature and Its Application in Group Signature
Information Security and Cryptology
Interpolation of the Double Discrete Logarithm
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Reputation Systems for Anonymous Networks
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Fair Traceable Multi-Group Signatures
Financial Cryptography and Data Security
Practical Anonymous Divisible E-Cash from Bounded Accumulators
Financial Cryptography and Data Security
Certificate-Based Signature Schemes without Pairings or Random Oracles
ISC '08 Proceedings of the 11th international conference on Information Security
VeryIDX - A Digital Identity Management System for Pervasive Computing Environments
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
Compact and Anonymous Role-Based Authorization Chain
ACM Transactions on Information and System Security (TISSEC)
PEREA: towards practical TTP-free revocation in anonymous authentication
Proceedings of the 15th ACM conference on Computer and communications security
Efficient attributes for anonymous credentials
Proceedings of the 15th ACM conference on Computer and communications security
Rethinking accountable privacy supporting services: extended abstract
Proceedings of the 4th ACM workshop on Digital identity management
Research on anonymous signatures and group signatures
Computer Communications
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Sanitizable Signatures Revisited
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Universally Composable Adaptive Oblivious Transfer
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient Protocols for Set Membership and Range Proofs
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
On the Portability of Generalized Schnorr Proofs
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Distributed architectures for electronic cash schemes: a survey
International Journal of Parallel, Emergent and Distributed Systems
Breaking and repairing trapdoor-free group signature schemes from Asiacrypt'2004
Journal of Computer Science and Technology
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
On the Theoretical Gap between Group Signatures with and without Unlinkability
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Leak-free mediated group signatures
Journal of Computer Security
Hardware-Assisted Application-Level Access Control
ISC '09 Proceedings of the 12th International Conference on Information Security
APOD: Anonymous Physical Object Delivery
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Compact E-Cash and Simulatable VRFs Revisited
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Universally Composable Adaptive Priced Oblivious Transfer
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Polynomial Interpolation of the k-th Root of the Discrete Logarithm
CAI '09 Proceedings of the 3rd International Conference on Algebraic Informatics
Democratic group signatures with collective traceability
Computers and Electrical Engineering
Oblivious transfer with access control
Proceedings of the 16th ACM conference on Computer and communications security
Chosen-Ciphertext Secure RSA-Type Cryptosystems
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Practical Zero-Knowledge Proofs for Circuit Evaluation
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Survey on anonymous communications in computer networks
Computer Communications
Study on ring signature and its application
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
Hyper-elliptic curves based group signature
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
An efficient direct anonymous attestation scheme with forward security
WSEAS TRANSACTIONS on COMMUNICATIONS
Efficient and privacy-preserving enforcement of attribute-based access control
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Time-selective convertible undeniable signatures with short conversion receipts
Information Sciences: an International Journal
Proving in zero-knowledge that a number is the product of two safe primes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Confirmer signature schemes secure against adaptive adversaries
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
An anonymous credential system and a privacy-aware PKI
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A direct anonymous attestation scheme for embedded devices
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
On the generic and efficient constructions of secure designated confirmer signatures
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Privacy-enhanced content distribution and charging scheme using group signature
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Quasi-efficient revocation of group signatures
FC'02 Proceedings of the 6th international conference on Financial cryptography
Convertible group undeniable signatures
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Extracting group signatures from traitor tracing schemes
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A signature scheme with efficient protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Anonymous authentication scheme for subscription services
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Anonymous pay-TV system with secure revenue sharing
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Blind identity-based encryption and simulatable oblivious transfer
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Two-party computing with encrypted data
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Direct anonymous attestation (DAA): ensuring privacy with corrupt administrators
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Hidden identity-based signatures
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Enhancing the trust and perceived security in e-cognocracy
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
PPAA: peer-to-peer anonymous authentication
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Improved conditional e-payments
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Key management scheme with bionic optimization
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Hyper-elliptic curves based ring signature
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
P-signatures and noninteractive anonymous credentials
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Security approaches in e-cognocracy
Computer Standards & Interfaces
Accountable privacy based on publicly verifiable secret sharing
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Multifactor identity verification using aggregated proof of knowledge
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Jack: scalable accumulator-based nymble system
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
An anonymous attestation scheme with optional traceability
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
ACM Transactions on Information and System Security (TISSEC)
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Structure-preserving signatures and commitments to group elements
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
The Fiat-Shamir transform for group and ring signature schemes
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Get shorty via group signatures without encryption
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Solving revocation with efficient update of anonymous credentials
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Privacy-preserving, taxable bank accounts
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
A certifying compiler for zero-knowledge proofs of knowledge based on Σ-protocols
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
A hybrid method to detect deflation fraud in cost-per-action online advertising
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
A formal model of identity mixer
FMICS'10 Proceedings of the 15th international conference on Formal methods for industrial critical systems
Towards practical anonymous password authentication
Proceedings of the 26th Annual Computer Security Applications Conference
Additive combinatorics and discrete logarithm based range protocols
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Proof-of-knowledge of representation of committed value and its applications
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Automatic generation of sigma-protocols
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
ProvSec'10 Proceedings of the 4th international conference on Provable security
A forward secure direct anonymous attestation scheme
MMACTEE'09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Threshold ring signature without random oracles
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Securization of policy making social computing. An application to e-cognocracy
Computers in Human Behavior
Practical adaptive oblivious transfer from simple assumptions
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Algebraic construction for zero-knowledge sets
Journal of Computer Science and Technology
A novel group signature scheme based on MPKC
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Relaxed security notions for signatures of knowledge
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Conditional privacy through ring signature in vehicular ad-hoc networks
Transactions on computational science XIII
Electronic cash with anonymous user suspension
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Oblivious transfer with complex attribute-based access control
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Adapting helios for provable ballot privacy
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
ACM Transactions on Information and System Security (TISSEC)
Blind ring signatures secure under the chosen-target-CDH assumption
ISC'06 Proceedings of the 9th international conference on Information Security
Simulation-sound NIZK proofs for a practical language and constant size group signatures
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
An anonymous authentication scheme for identification card
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Anonymous authentication with optional shared anonymity revocation and linkability
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Off-Line group signatures with smart cards
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Verifier-Local revocation group signature schemes with backward unlinkability from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Universally convertible directed signatures
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient secure group signatures with dynamic joins and keeping anonymity against group managers
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Linkable ring signatures: security models and new schemes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
An (n - t)-out-of-n threshold ring signature scheme
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
An efficient group signature scheme from bilinear maps
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Group signature where group manager, members and open authority are identity-based
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Short linkable ring signatures revisited
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
On the security of a group signcryption scheme from distributed signcryption scheme
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient group signatures from bilinear pairing
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Session corruption attack and improvements on encryption based MT-Authenticators
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A cryptographic framework for the controlled release of certified data
SP'04 Proceedings of the 12th international conference on Security Protocols
Establishing trust with privacy
SP'04 Proceedings of the 12th international conference on Security Protocols
Location privacy in mobile computing environments
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Linkable democratic group signatures
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
An improved group signature scheme
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Efficient member revocation in group signature schemes
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
An improved double auction protocol against false bids
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Efficient Attributes for Anonymous Credentials
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Non-interactive zero-knowledge arguments for voting
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Group signatures with separate and distributed authorities
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Group signatures: better efficiency and new theoretical aspects
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Efficient blind signatures without random oracles
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Foundations of group signatures: the case of dynamic groups
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Time-selective convertible undeniable signatures
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Authenticating strangers in Online Social Networks
International Journal of Security and Networks
Security flaws in several group signatures proposed by popescu
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Short linkable ring signatures for e-voting, e-cash and attestation
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A restricted multi-show credential system and its application on e-voting
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Group signatures with efficient concurrent join
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A privacy preserving rental system
ISC'05 Proceedings of the 8th international conference on Information Security
Pseudonym generation scheme for ad-hoc group communication based on IDH
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Separable linkable threshold ring signatures
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
On the security models of (threshold) ring signature schemes
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Unlinkable priced oblivious transfer with rechargeable wallets
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Privacy-protecting coupon system revisited
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
A flexible framework for secret handshakes
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Coercion-resistant electronic elections
Towards Trustworthy Elections
Ring signature with designated linkability
IWSEC'06 Proceedings of the 1st international conference on Security
Shorter verifier-local revocation group signatures from bilinear maps
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Online/Offline ring signature scheme
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
A robust double auction protocol based on a hybrid trust model
ICISS'05 Proceedings of the First international conference on Information Systems Security
A framework for practical universally composable zero-knowledge protocols
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Efficient schemes for anonymous yet authorized and bounded use of cloud resources
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
A traceable group signature scheme
Mathematical and Computer Modelling: An International Journal
Partially blind threshold signatures based on discrete logarithm
Computer Communications
Opaak: using mobile phones to limit anonymous identities online
Proceedings of the 10th international conference on Mobile systems, applications, and services
Private client-side profiling with random forests and hidden markov models
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Formal analysis of anonymity in ECC-Based direct anonymous attestation schemes
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols
Proceedings of the 2012 ACM conference on Computer and communications security
Practical yet universally composable two-server password-authenticated secret sharing
Proceedings of the 2012 ACM conference on Computer and communications security
PERM: practical reputation-based blacklisting without TTPS
Proceedings of the 2012 ACM conference on Computer and communications security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Oblivious transfer with hidden access control from attribute-based encryption
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
Theoretical Computer Science
P3ERS: Privacy-Preserving PEer Review System
Transactions on Data Privacy
Information Sciences: an International Journal
How not to prove yourself: pitfalls of the fiat-shamir heuristic and applications to helios
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
(Strong) multi-designated verifiers signatures secure against rogue key attack
NSS'12 Proceedings of the 6th international conference on Network and System Security
Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
ZQL: a compiler for privacy-preserving data processing
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |