Revocable Privacy: Principles, Use Cases, and Technologies
暂无分享,去创建一个
[1] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[2] Jan Camenisch,et al. Compact E-Cash , 2005, EUROCRYPT.
[3] Jaap-Henk Hoepman,et al. Forward-Secure Distributed Encryption , 2014, Privacy Enhancing Technologies.
[4] Dan Bogdanov,et al. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation , 2015, Financial Cryptography.
[5] Ian Goldberg,et al. Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting , 2013, WPES.
[6] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[7] Jaap-Henk Hoepman,et al. Revocable Privacy 2011 – use cases , 2012 .
[8] Markus Stadler,et al. Cryptographic protocols for revocable privacy , 1996 .
[9] Jaap-Henk Hoepman,et al. Non-interactive distributed encryption: a new primitive for revocable privacy , 2011, WPES.
[10] Essam Ghadafi. Efficient Distributed Tag-Based Encryption and Its Application to Group Signatures with Efficient Distributed Traceability , 2014, LATINCRYPT.
[11] Jan Camenisch,et al. How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.
[12] Sean W. Smith,et al. Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.
[13] Willy Susilo,et al. Short E-Cash , 2005, INDOCRYPT.
[14] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[15] Joachim Biskup,et al. Recent Advances in Intrusion Detection , 2000, Lecture Notes in Computer Science.
[16] Sean W. Smith,et al. Nymble: Blocking Misbehaving Users in Anonymizing Networks , 2011, IEEE Transactions on Dependable and Secure Computing.