Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements
暂无分享,去创建一个
[1] Daniel Slamanig,et al. Towards a New Paradigm for Privacy and Security in Cloud Services , 2015, CSP Forum.
[2] Thomas R. Groß,et al. Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs , 2014, CCSW.
[3] Shafi Goldwasser,et al. Functional Signatures and Pseudorandom Functions , 2014, Public Key Cryptography.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[6] Dario Catalano,et al. Homomorphic Signatures and Message Authentication Codes , 2014, SCN.
[7] Daniel Slamanig,et al. ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[8] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[9] Jan Camenisch,et al. Concepts Around Privacy-Preserving Attribute-Based Credentials - Making Authentication with Anonymous Credentials Practical , 2013, Privacy and Identity Management.
[10] Thomas Groß,et al. A Virtualization Assurance Language for Isolation and Deployment , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.
[11] Ron Steinfeld,et al. Content Extraction Signatures , 2001, ICISC.
[12] Gene Tsudik,et al. Sanitizable Signatures , 2005, ESORICS.
[13] Thomas Groß,et al. Signatures and Efficient Proofs on Committed Graphs and NP-Statements , 2015, Financial Cryptography.