Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
116 | Dijiang Huang |
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006, pp. 65-74, 2006, ACM, 1-59593-557-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
traffic analysis, unlinkability, evidence theory |
109 | Sandra Steinbrecher, Stefan Köpsell |
Modelling Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers, pp. 32-47, 2003, Springer, 3-540-20610-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
101 | Go Ohtake, Arisa Fujii, Goichiro Hanaoka, Kazuto Ogawa |
On the Theoretical Gap between Group Signatures with and without Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 149-166, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, group signature, unlinkability |
101 | Lars Fischer 0002, Stefan Katzenbeisser 0001, Claudia Eckert 0001 |
Measuring unlinkability revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 105-110, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymity, mobile communication, unlinkability, positional information |
80 | Dijiang Huang |
Unlinkability Measure for IEEE 802.11 Based MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(3), pp. 1025-1034, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
80 | Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura |
Unlinkability and Real World Constraints in RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, USA, pp. 371-376, 2007, IEEE Computer Society, 978-0-7695-2788-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
79 | Yasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto Yasuura |
Quantitative evaluation of unlinkable ID matching schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 55-60, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
degree of unlinkability, k-steps ID matching, privacy, RFID security |
79 | Jae-Gwi Choi, Ji-Hwan Park |
A Generalization of an Anonymous Buyer-Seller Watermarking Protocol and Its Application to Mobile Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Third InternationalWorkshop, IWDW 2004, Seoul, SouthKorea, October 30 - November 1, 2004, Revised Selected Papers, pp. 232-243, 2004, Springer, 3-540-24839-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
buyer-seller watermarking, Copyright protection, mobile communications, unlinkability |
73 | Toru Nakanishi 0001, Nobuo Funabiki |
A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 17-32, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
backward unlinkability, DLDH assumption, group signature, revocation, bilinear maps |
59 | Benoît Libert, Damien Vergnaud |
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 498-517, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
verifier-local revocation, backward unlinkability, Group signatures, standard model, bilinear maps |
57 | Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel 0001 |
Unlinkable Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 51-55, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Untraceable Electronic Cash System Using Fair Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 24-26 October 2006, Shanghai, China, pp. 39-46, 2006, IEEE Computer Society, 0-7695-2645-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fair blind signature, privacy, electronic cash, cryptology |
51 | Apu Kapadia, Prasad Naldurg, Roy H. Campbell |
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 141-150, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski |
Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 354-366, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Shouhuai Xu, Moti Yung |
k-anonymous secret handshakes with reusable credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 158-167, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, anonymity, unlinkability, secret handshake, credential systems |
50 | Toru Nakanishi 0001, Yuji Sugiyama |
Unlinkable Divisible Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 121-134, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Group signature, Divisibility, Electronic cash, Unlinkability |
43 | Ernie Brickell, Jiangtao Li 0001 |
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 21-30, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocols, trusted computing |
43 | Toru Nakanishi 0001, Mitsuaki Shiota, Yuji Sugiyama |
An Efficient Online Electronic Cash with Unlinkable Exact Payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 367-378, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
43 | Toru Nakanishi 0001, Nobuaki Haruna, Yuji Sugiyama |
Unlinkable Electronic Coupon Protocol with Anonymity Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 37-46, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
37 | Kevin S. Bauer, Damon McCoy, Ben Greenstein, Dirk Grunwald, Douglas C. Sicker |
Physical Layer Attacks on Unlinkability in Wireless LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings, pp. 108-127, 2009, Springer, 978-3-642-03167-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Joan Arnedo-Moreno, Jordi Herrera-Joancomartí |
Maintaining Unlinkability in Group Based P2P Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2009, Groningen, The Netherlands, 29 June - 1 July 2009, Proceedings, pp. 140-145, 2009, IEEE Computer Society, 978-0-7695-3683-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Josep Domingo-Ferrer |
Location privacy via unlinkability: an alternative to cloaking and perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAIS ![In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, Nantes, France, March 29, 2008, pp. 1-2, 2008, ACM, 978-1-59593-965-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Atsushi Sakurai, Takashi Minohara, Ryota Sato, Keisuke Mizutani |
One-Time Receiver Address in IPv6 for Protecting Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 240-246, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Matthias Franz, Bernd Meyer 0002, Andreas Pashalidis |
Attacking Unlinkability: The Importance of Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, pp. 1-16, 2007, Springer, 978-3-540-75550-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Toru Nakanishi 0001, Nobuo Funabiki |
Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 533-548, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Jun Furukawa 0001 |
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 319-332, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Zichen Li, Junmei Zhang, Weidong Kou |
The Unlinkability of Randomization-Enhanced Chaum's Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings, pp. 244, 2003, IEEE Computer Society, 0-7695-1926-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Mike Burmester, Breno de Medeiros, Jorge Munilla, Alberto Peinado |
Secure EPC Gen2 Compliant Radio Frequency Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings, pp. 227-240, 2009, Springer, 978-3-642-04382-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
EPCGen2 compliance, security, identification, unlinkability |
36 | Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum |
Provable anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 63-72, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, formal methods, cryptography, anonymity, knowledge, epistemic logic, unlinkability, crowds, onion routing |
36 | Michael K. Reiter, XiaoFeng Wang 0001 |
Fragile mixing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 227-235, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, anonymity, unlinkability, mix |
36 | Andreas Pashalidis, Chris J. Mitchell |
Limits to Anonymity When Using Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 4-12, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
pseudonym systems, privacy, timing attacks, unlinkability, anonymous credential systems |
36 | Jianhong Zhang, Qianhong Wu, Yumin Wang |
A Novel Efficient Group Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 292-300, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
anonymity, revocation, forward security, unlinkability, Group signature scheme |
36 | Reihaneh Safavi-Naini, Yejing Wang |
Anonymous Traceability Schemes with Unconditional Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 250-261, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
traceability schemes, anonymity, unlinkability, authentication codes, Digital fingerprint |
36 | Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf 0001 |
Pseudonym Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, pp. 184-199, 1999, Springer, 3-540-67185-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
nyms, credential transfer, Anonymity, credentials, pseudonyms, unlinkability |
29 | Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto |
An Efficient Anonymous Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 272-286, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Jianhong Zhang, Qin Geng |
On the Security of A Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 1310-1314, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Nicholas Hopper, Eugene Y. Vasserman |
On the effectiveness of k;-anonymity against traffic analysis and surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 9-18, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
k, mass surveillance, anonymity, statistical disclosure |
29 | Ginger Perng, Michael K. Reiter, Chenxi Wang |
M2: Multicasting Mixes for Efficient and Anonymous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 4-7 July 2006, Lisboa, Portugal, pp. 59, 2006, IEEE Computer Society, 0-7695-2540-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Yanjiang Yang, Feng Bao 0001, Robert H. Deng |
Security Analysis and Fix of an Anonymous Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 537-547, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Jianhong Zhang, Jiancheng Zou, Yumin Wang |
An Improved Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 185-194, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Feng Bao 0001 |
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 417-429, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Shuaining Gao, Xinjian Chen 0004, Hongbo Li 0004, Willy Susilo, Qiong Huang 0001 |
Post-quantum secure group signature with verifier local revocation and backward unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 88, pp. 103782, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Tanping Zhou, Dong Chen, Wenchao Liu 0002, Xiaoyuan Yang |
Attacks and Improvement of Unlinkability of Biometric Template Protection Scheme Based on Bloom Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 11(3), pp. 3251-3261, July - September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Jae Hyun Choi, Ik Rae Jeong |
Cost-Effectively Searchable Blackbox Data With Unlinkability Based on Public Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 100458-100464, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Hideaki Miyaji, Po-Chu Hsu, Atsuko Miyaji |
Privacy-Preserving Social Media With Unlinkability and Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 28955-28965, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Jung Yeon Hwang |
Dynamic Anonymous Credential Systems With Controllable Anonymity and Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 142015-142029, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Mahdi R. Alagheband, Atefeh Mashatan |
Formal unlinkability analysis of message authentication protocols based on authentic channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 79(7), pp. 8097-8123, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Vítor Nunes, José Brás, Afonso Carvalho, Diogo Barradas, Kevin Gallagher 0001, Nuno Santos 0001 |
Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-Funnels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACMNET ![In: PACMNET 1(CoNEXT3), pp. 18:1-18:26, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Lixue Sun, Chunxiang Xu, Xiaojun Zhang, Fugeng Zeng |
Certificateless Searchable Encryption With Trapdoor Unlinkability for Industrial Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 17(3), pp. 4521-4532, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Rajkumar Gaur, Shiva Prakash, L. V. Narasimha Prasad, Sanjay Kumar, Kumar Abhishek 0004, Manisha Guduri |
A Secure and Efficient Scheme Based on Unlinkability and Anonymous Traceable Protocol for Cloud-Assisted IoT Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 32(18), pp. 2350316:1-2350316:21, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Cláudio Correia, Miguel Correia 0001, Luís E. T. Rodrigues |
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.03402, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell |
Improving unlinkability in C-ITS: a methodology for optimal obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.04130, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Marta Gomez-Barrero, Javier Galbally, Christian Rathgeb, Christoph Busch 0001 |
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.04633, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Mohsen Minaei, Panagiotis Chatzigiannis, Shan Jin, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani, Pedro Moreno-Sanchez |
Unlinkability and Interoperability in Account-Based Universal Payment Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 916, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
23 | Cláudio Correia, Miguel Correia 0001, Luís E. T. Rodrigues |
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 3018-3032, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Yevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell |
Improving Unlinkability in C-ITS: A Methodology For Optimal Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023, pp. 677-685, 2023, SciTePress, 978-989-758-624-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Mohsen Minaei, Panagiotis Chatzigiannis, Shan Jin, Srinivasan Raghuraman, Ranjit Kumaresan, Mahdi Zamani, Pedro Moreno-Sanchez |
Unlinkability and Interoperability in Account-Based Universal Payment Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FC Workshops ![In: Financial Cryptography and Data Security. FC 2023 International Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Brač, Croatia, May 5, 2023, Revised Selected Papers, pp. 367-384, 2023, Springer, 978-3-031-48805-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | David Baelde, Alexandre Debant, Stéphanie Delaune |
Proving Unlinkability Using ProVerif Through Desynchronised Bi-Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 36th IEEE Computer Security Foundations Symposium, CSF 2023, Dubrovnik, Croatia, July 10-14, 2023, pp. 75-90, 2023, IEEE, 979-8-3503-2192-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss |
Improving Unlinkability of Attribute-based Authentication through Game Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 25(2), pp. 12:1-12:36, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Yanhua Zhang, Ximeng Liu, Yupu Hu, Yong Gan, Huiwen Jia |
Verifier-local revocation group signatures with backward unlinkability from lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Inf. Technol. Electron. Eng. ![In: Frontiers Inf. Technol. Electron. Eng. 23(6), pp. 876-892, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Jaeyeol Jeong, Jin Wook Byun, Ik Rae Jeong |
Key Agreement Between User and Drone With Forward Unlinkability in Internet of Drones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 17134-17144, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Kah Meng Chong, Amizah Malip |
Bridging unlinkability and data utility: Privacy preserving data publication schemes for healthcare informatics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 191, pp. 194-207, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Victoria Manfredi, Cameron Donnay Hill |
Quantifying unlinkability in multi-hop wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 181, pp. 32-44, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Takeshi Miyamae, Kanta Matsuura |
Coin Transfer Unlinkability Under the Counterparty Adversary Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ledger ![In: Ledger 7, June 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Ross Horne, Sjouke Mauw, Semen Yurkov |
Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 35th IEEE Computer Security Foundations Symposium, CSF 2022, Haifa, Israel, August 7-10, 2022, pp. 364-379, 2022, IEEE, 978-1-6654-8417-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto |
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 337-362, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Simon Kirchgasser, Andreas Uhl |
Template Protection: On the need to adapt the current Unlinkability Evaluation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOSIG ![In: Proceedings of the 21st International Conference of the Biometrics Special Interest Group, BIOSIG 2022, Darmstadt, Germany, September 14-16, 2022, pp. 46-53, 2022, IEEE / Gesellschaft für Informatik e.V., 978-3-88579-723-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
23 | Kah Meng Chong, Amizah Malip |
Trace Me If You Can: An Unlinkability Approach for Privacy-Preserving in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 143950-143968, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Sherif Abdelfattah, Mohamed Baza, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Gautam Srivastava 0001, Fawaz Alsolami 0001, Abdullah Marish Ali |
Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 151129-151141, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Shun-Chi Wu, Pei-Lun Hung, A. Lee Swindlehurst |
ECG Biometric Recognition: Unlinkability, Irreversibility, and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 8(1), pp. 487-500, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Ross Horne, Sjouke Mauw, Semen Yurkov |
Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen EMV Payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.02029, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Silivanxay Phetsouvanh, Anwitaman Datta, Alwen Tiu |
On unlinkability and denial of service attacks resilience of whistleblower platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 118, pp. 438-452, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jing Tian, Gaopeng Gou, Yangyang Guan, Wei Xia, Gang Xiong 0001, Chang Liu 0049 |
A Study on Security Analysis of the Unlinkability in Tor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: 2021 IEEE Military Communications Conference, MILCOM 2021, San Diego, CA, USA, November 29 - Dec. 2, 2021, pp. 323-328, 2021, IEEE, 978-1-6654-3956-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | An Braeken |
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 181, pp. 107424, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Xinghua Li 0001, Huijuan Zhang, Yanbing Ren, Siqi Ma, Bin Luo 0006, Jian Weng 0001, Jianfeng Ma 0001, Xiaoming Huang |
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 7(12), pp. 11789-11802, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Sanghoon Lee, Ik Rae Jeong |
On the Unlinkability of Fingerprint Shell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2020, pp. 8256929:1-8256929:8, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | David Baelde, Stéphanie Delaune, Solène Moreau |
A Method for Proving Unlinkability of Stateful Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020, pp. 169-183, 2020, IEEE, 978-1-7281-6572-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Victoria Manfredi, Cameron Donnay Hill |
Quantifying Unlinkability in Multi-hop Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: MSWiM '20: 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Alicante, Spain, November 16-20, 2020, pp. 73-82, 2020, ACM, 978-1-4503-8117-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Dongdong Zhao 0001, Xiaoyan Zhou, Jianwen Xiang, Wenjian Luo |
NDBIris with Better Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCI ![In: 2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020, Canberra, Australia, December 1-4, 2020, pp. 2948-2956, 2020, IEEE, 978-1-7281-2547-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Fadi Barbàra, Claudio Schifanella |
DMix: decentralized mixer for unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BRAINS ![In: 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, BRAINS 2020, Paris, France, September 28-30, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-7091-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Niko Tsakalakis |
Analysing the impact of the GDPR on eIDAS : supporting effective data protection by design for cross-border electronic identification through unlinkability measures ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
23 | Aafaf Ouaddah |
Chapter Eight - A blockchain based access control framework for the security and privacy of IoT with strong anonymity unlinkability and intractability guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Comput. ![In: Adv. Comput. 115, pp. 211-258, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Mohit Gupta 0003, Narendra S. Chaudhari |
Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 10(11), pp. 4491-4501, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Mohit Gupta 0003, Narendra S. Chaudhari |
Anonymous roaming authentication protocol for wireless network with backward unlinkability and natural revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 74(3-4), pp. 175-184, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Ihor Filimonov, Ross Horne, Sjouke Mauw, Zach Smith |
Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (1) ![In: Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I, pp. 577-594, 2019, Springer, 978-3-030-29958-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Sooyeon Shin, Taekyoung Kwon 0002 |
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 6, pp. 11229-11241, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Marta Gomez-Barrero, Javier Galbally, Christian Rathgeb, Christoph Busch 0001 |
General Framework to Evaluate Unlinkability in Biometric Template Protection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 13(6), pp. 1406-1420, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Hubert Comon, Adrien Koutsos |
Formal Computational Unlinkability Proofs of RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1705.02296, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
23 | Lynn Batten, Xun Yi |
Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1220, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
23 | Yi-Ping Luo, Shang-Lun Tsai, Tzonelih Hwang, Shih-Hung Kao |
On "A new quantum blind signature with unlinkability". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 16(4), pp. 87, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Yulong Wang, Qingyu Chen, Junjie Yi, Jun Guo 0007 |
U-TRI: Unlinkability Through Random Identifier for SDN Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MTD@CCS ![In: Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS 2017, Dallas, TX, USA, October 30, 2017, pp. 3-15, 2017, ACM, 978-1-4503-5176-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Hubert Comon, Adrien Koutsos |
Formal Computational Unlinkability Proofs of RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017, pp. 100-114, 2017, IEEE Computer Society, 978-1-5386-3217-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Huan Feng, Kang G. Shin |
Masquerade of mobile applications: Introducing unlinkability in a practical way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 54-61, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Ron Berman, Amos Fiat, Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Tomer Levinboim, Amnon Ta-Shma |
Provable Unlinkability Against Traffic Analysis with Low Message Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 28(3), pp. 623-640, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | SeongHan Shin, Kazukuni Kobara |
On Unlinkability of Password-Based Anonymous Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(6), pp. 1320-1324, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Qi Jiang 0001, Jianfeng Ma 0001, Xiang Lu, Youliang Tian |
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 8(6), pp. 1070-1081, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Wei-Min Shi, Jian-biao Zhang, Yi-Hua Zhou 0001, Yu-Guang Yang 0001 |
A new quantum blind signature with unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 14(8), pp. 3019-3030, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Naveen Kumar 0011, Anish Mathuria, Manik Lal Das |
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE/ISPA (1) ![In: 2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1, pp. 1249-1254, 2015, IEEE, 978-1-4673-7952-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Florent Fourcot |
Et@net : étalement d'adresse pour la sécurité de l'internet. (Adress spreading in future internet supporting both the unlinkability of communication relations and the filtering of non legitimate traffic). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
23 | Syed Taqi Ali, B. B. Amberker |
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Appl. Cryptogr. ![In: Int. J. Appl. Cryptogr. 3(2), pp. 148-165, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|