Auditable Anonymous Delegation
暂无分享,去创建一个
[1] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[2] Bruce Christianson,et al. Anonymous Authentication , 2004, Security Protocols Workshop.
[3] Bruce Christianson,et al. Binding Bit Patterns to Real World Entities , 1997, Security Protocols Workshop.
[4] Paul F. Syverson,et al. Authentic Attributes with Fine-Grained Anonymity Protection , 2000, Financial Cryptography.
[5] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[6] Bruce Christianson,et al. Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers , 2006, Security Protocols Workshop.
[7] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[8] Bruce Schneier,et al. Ten Risks of PKI , 2004 .
[9] Bruce Christianson,et al. Secure Sessions from Weak Secrets , 2003, Security Protocols Workshop.
[10] Bruce Christianson,et al. Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Paul F. Syverson,et al. Unlinkable serial transactions: protocols and applications , 1999, TSEC.
[13] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[14] Bruno Crispo. Delegation of Responsibility (Transcript of Discussion) , 1998, Security Protocols Workshop.
[15] Partha Das Chowdhury. Anonymity and trust in the electronic world , 2005 .
[16] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] Jeffrey C. Lagarias,et al. Cryptology and Computational Number Theory , 1997 .
[18] Bruce Christianson,et al. Anonymous Context Based Role Activation Mechanism , 2005, Security Protocols Workshop.
[19] Amit Sahai,et al. Pseudonym Systems , 1999, Selected Areas in Cryptography.