Author:
Vossaert Jan,Lapon Jorn,De Decker Bart,Naessens Vincent
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Lecture Notes in Computer Science;P. Bichsel,2012
2. Bichsel, P., Camenisch, J., Groß, T., Shoup, V.: Anonymous credentials on a standard Java Card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 600–610. ACM (2009)
3. Brasser, F.F., Bugiel, S., Filyanov, A., Sadeghi, A.-R., Schulz, S.: Softer smartcards - usable cryptographic tokens with secure execution. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 329–343. Springer, Heidelberg (2012)
4. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pp. 132–145. ACM, New York (2004)
5. Lecture Notes in Computer Science;D. Cock De,2004
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Information Security and Privacy – Challenges and Outlook;IFIP Advances in Information and Communication Technology;2021
2. A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing;Journal of Ambient Intelligence and Humanized Computing;2016-06-18
3. Citizen Electronic Identities using TPM 2.0;Proceedings of the 4th International Workshop on Trustworthy Embedded Devices - TrustED '14;2014