1. Lecture Notes in Computer Science;G. Ateniese,2000
2. Lecture Notes in Computer Science;M. Bellare,2003
3. Lecture Notes in Computer Science;M. Bellare,2005
4. Lecture Notes in Computer Science;S. Brands,1994
5. Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clonewars: efficient periodic n-times anonymous authentication. In: Juels, A., Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM Conference on Computer and Communications Security, pp. 201–210. ACM Press, New York (2006)