Author:
Roman Rodrigo,Lopez Javier,Dugeon Olivier,Lacoste Marc,Plaza Pierre Yves,Bel Marta
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference27 articles.
1. Bechler, M., Hof, H. J., Kraft, D., Rahlke, F., & Wolf, L. (2004). A cluster-based security architecture for ad hoc networks. In Annual joint conference of the IEEE computer and communications societies (INFOCOM’04) (pp. 2393–2403).
2. Benjumea V., Choi, S., Lopez, J., & Yung, M. (2007). Anonymity 2.0—X.509 extensions supporting privacy-friendly authentication. In Cryptology and network security conference (CANS’07) (pp. 265–281).
3. Benjumea, V., Lopez, J., & Troya, J. (2006). Anonymous attribute certificates based on traceable signatures. Internet Research, 16(2), 120–139.
4. Bhargav-Spantzel, A., Camenisch, J., Gross, T., & Sommer, D. (2007). User centricity: A taxonomy and open issues. Journal of Computer Security, 15(5), 493–527.
5. Camenisch, J., & Lysyanskaya, A. (2001). Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In International conference on advances in cryptology (EUROCRYPT’01) (pp. 93–118).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献