Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
106 | Chae Hoon Lim, Taekyoung Kwon 0002 |
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 1-20, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
86 | Ton van Deursen, Sjouke Mauw, Sasa Radomirovic |
Untraceability of RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings, pp. 1-15, 2008, Springer, 978-3-540-79965-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RFID protocols, formal verification, untraceability |
86 | Rafal Leszczyna, Janusz Górski |
Performance analysis of untraceability protocols for mobile agents using an adaptable framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), Hakodate, Japan, May 8-12, 2006, pp. 1063-1070, 2006, ACM, 1-59593-303-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, performance evaluation, privacy, mobile agents, anonymity, security protocols, ACM proceedings, untraceability |
68 | Rafal Leszczyna, Janusz Górski |
Untraceability of mobile agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 1233-1234, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, mobile agents, anonymity, security protocols, ACM proceedings, untraceability |
62 | Michael Waidner, Birgit Pfitzmann |
The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 690, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
53 | Rafal Leszczyna |
Anonymity Architecture for Mobile Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HoloMAS ![In: Holonic and Multi-Agent Systems for Manufacturing, Third International Conference on Industrial Applications of Holonic and Multi-Agent Systems, HoloMAS 2007, Regensburg, Germany, September 3-5, 2007, Proceedings, pp. 93-103, 2007, Springer, 978-3-540-74478-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Youngjoon Seo, Hyunrok Lee, Kwangjo Kim |
A Scalable and Untraceable Authentication Protocol for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 252-261, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
51 | Sherin M. Moussa, Mohamed Hashem, Gul Agha |
An agent-based framework for inhabitants' untraceability in ubiquitous environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 386-390, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
agent-based ubiquitous applications, simulation tool for evaluation, mobile agents, smart spaces, untraceability |
44 | Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng |
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 71-85, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Authentication, RFID, Anonymous |
42 | Khaled Ouafi, Raphael C.-W. Phan |
Traceable Privacy of Recent Provably-Secure RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 479-489, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, RFID, Authentication protocols, Untraceability |
42 | Khaled Ouafi, Raphael C.-W. Phan |
Privacy of Recent RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 263-277, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, RFID, provably secure, authentication protocols, untraceability |
42 | Lin-Chuan Wu |
Analysis of traceability attack on Camenisch et al.'s blind signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 366, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptography, digital signature, information security, blind signature, untraceability |
35 | Feng Bao 0001 |
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 417-429, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Oleksandr Kurbatov, Dmytro Zakharov, Anton Levochko, Kyrylo Riabov, Bohdan Skriabin |
Multichain Taprootized Atomic Swaps: Introducing Untraceability through Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.16735, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Hiral S. Trivedi, Sankita J. Patel |
Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 34(4), April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Anil Kumar Sutrala, Mohammad S. Obaidat, Sourav Saha 0002, Ashok Kumar Das, Mamoun Alazab, Youngho Park 0005 |
Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 23(3), pp. 2316-2330, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Prasanta Kumar Roy, Ansuman Bhattacharya |
Secure and efficient authentication protocol with user untraceability for global roaming services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 27(8), pp. 5189-5206, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Sina Aeeneh, João Otávio Massari Chervinski, Jiangshan Yu, Nikola Zlatanov |
New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICBC ![In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021, Sydney, Australia, May 3-6, 2021, pp. 1-5, 2021, IEEE, 978-1-6654-3578-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | An Braeken, Abdellah Touhafi |
Efficient Mobile User Authentication Service with Privacy Preservation and User Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cloudtech ![In: 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020, Marrakesh, Morocco, November 24-26, 2020, pp. 1-8, 2020, IEEE, 978-1-7281-6175-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Weijian Zhang, Chao Lin, Zhuo Lyu, Chen Cen, Min Luo |
An Efficient Blind Signature Scheme with Untraceability for Data Privacy in Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpaCCS Workshops ![In: Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings, pp. 586-597, 2020, Springer, 978-3-030-68883-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Lynn Batten, Xun Yi |
Off-line digital cash schemes providing untraceability, anonymity and change. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 19(1), pp. 81-110, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Marko Kompara, SK Hafizul Islam, Marko Hölbl |
A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 148, pp. 196-213, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo |
Re-thinking untraceability in the CryptoNote-style blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 186, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Swati Rawal, Sahadeo Padhye |
Untraceability of Partial Blind and Blind Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers, pp. 452-459, 2019, Springer, 978-3-030-42920-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo |
Re-Thinking Untraceability in the CryptoNote-Style Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 32nd IEEE Computer Security Foundations Symposium, CSF 2019, Hoboken, NJ, USA, June 25-28, 2019, pp. 94-107, 2019, IEEE, 978-1-7281-1407-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Yangguang Tian, Yingjiu Li, Binanda Sengupta, Robert Huijie Deng, Albert Ching, Weiwei Liu 0005 |
Privacy-Preserving Remote User Authentication with k-Times Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers, pp. 647-657, 2018, Springer, 978-3-030-14233-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Niranchana Radhakrishnan, Marimuthu Karuppiah, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan |
Security on "A Lightweight Authentication Scheme with User Untraceability". ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpaCCS Workshops ![In: Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings, pp. 489-496, 2017, Springer, 978-3-319-72394-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Hai-Duong Le, Ngoc-Tu Nguyen 0003, Chin-Chen Chang 0001 |
Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 18(2), pp. 335-344, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
26 | Xu Yang 0002, Xinyi Huang 0001, Joseph K. Liu |
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 62, pp. 190-195, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Kuo-Hui Yeh |
A lightweight authentication scheme with user untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Inf. Technol. Electron. Eng. ![In: Frontiers Inf. Technol. Electron. Eng. 16(4), pp. 259-271, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Gildas Avoine, Iwen Coisel, Tania Martin |
Untraceability Model for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 13(10), pp. 2397-2405, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Jin Wang 0009, Kejie Lu, Jianping Wang 0001, Chunming Qiao |
Untraceability of mobile devices in wireless mesh networks using linear network coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, pp. 270-274, 2013, IEEE, 978-1-4673-5944-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Chin-Chen Chang 0001, Hai-Duong Le, Ching-Hsiang Chang |
Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012, pp. 38-43, 2012, IEEE Computer Society, 978-0-7695-4776-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Gerrit Bleumer |
Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1351-1352, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Yong Ki Lee, Lejla Batina, Dave Singelée, Bart Preneel, Ingrid Verbauwhede |
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Towards Hardware-Intrinsic Security ![In: Towards Hardware-Intrinsic Security - Foundations and Practice, pp. 237-257, 2010, Springer, 978-3-642-14451-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Mete Akgün, Mehmet Ufuk Çaglayan |
Extending an RFID Security and Privacy Model by Considering Forward Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STM ![In: Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers, pp. 239-254, 2010, Springer, 978-3-642-22443-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Sébastien Canard, Amandine Jambert |
Untraceability and Profiling Are Not Mutually Exclusive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings, pp. 117-128, 2010, Springer, 978-3-642-15151-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Hung-Yu Chien, Chi-Sung Laih |
ECC-based lightweight authentication protocol with untraceability for low-cost RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Parallel Distributed Comput. ![In: J. Parallel Distributed Comput. 69(10), pp. 848-853, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the 2009 International Conference on Security & Management, SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes, pp. 307-313, 2009, CSREA Press, 1-60132-126-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
26 | Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan 0001 |
Untraceability in the applied pi-calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009, pp. 1-6, 2009, IEEE, 978-1-4244-5648-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jiang Wu 0001, Douglas R. Stinson |
How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 201, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
26 | Soon-Seok Kim |
Mobile Terminated Protocol to Remote Domain Considering User Location Untraceability Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inform. and Commun. Convergence Engineering ![In: J. Inform. and Commun. Convergence Engineering 5(3), pp. 265-268, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
26 | Andre Barroso, Hans-Jürgen Reumerman |
An Addressing Scheme to Support Untraceability in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 869-873, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie |
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 747-753, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Gerrit Bleumer |
Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang |
A new blind signature based on the discrete logarithm problem for untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 164(3), pp. 837-841, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ting Wu 0001, Jin-Rong Wang |
Comment: A new blind signature based on the discrete logarithm problem for untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 170(2), pp. 999-1005, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Zhengjun Cao |
Untraceability of Two Group Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 55, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
26 | Carlos Aguilar Melchor, Yves Deswarte |
pMIX: Untraceability for Small Hiding Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 27-29 July 2005, Cambridge, MA, USA, pp. 29-40, 2005, IEEE Computer Society, 0-7695-2326-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Chang-Seop Park |
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 44(2), pp. 267-273, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Zhengjun Cao, Lihua Liu |
Untraceability of Wang-Fu Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 268, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
26 | Akira Otsuka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1), pp. 140-148, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
26 | Mark Borning, Dogan Kesdogan, Otto Spaniol |
Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informationstechnik Tech. Inform. ![In: Informationstechnik Tech. Inform. 43(5), pp. 246-253, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Didier Samfat, Refik Molva, N. Asokan |
Untraceability in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: MOBICOM '95, Proceedings of the First Annual International Conference on Mobile Computing and Networking, Berkeley, CA, USA, November 13-15, 1995., pp. 26-36, 1995, ACM, 0-89791-814-2. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
CDPD, alias, security, mobility, authentication, anonymity, GSM, location privacy |
26 | Masahiro Mambo, Hirotsugu Kinoshita, Shigeo Tsujii |
Communication protocols with untraceability of sender and receiver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Syst. Comput. Jpn. ![In: Syst. Comput. Jpn. 23(9), pp. 11-18, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
26 | Michael Waidner |
Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 302-319, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
26 | David Chaum |
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 1(1), pp. 65-75, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
24 | Aniello Castiglione, Roberto De Prisco, Alfredo De Santis |
Do You Trust Your Phone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Linz, Austria, September 1-4, 2009. Proceedings, pp. 50-61, 2009, Springer, 978-3-642-03963-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security |
24 | Jiejun Kong, Xiaoyan Hong |
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2003, Annapolis, Maryland, USA, June 1-3, 2003, pp. 291-302, 2003, ACM, 1-58113-684-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
trapdoor, mobile ad-hoc network, broadcast, anonymity, pseudonymity, on-demand routing, untraceability |
24 | Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya |
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 12(3), pp. 197-223, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Divertibility, Subliminal-free, Cryptographic protocols, Identification, Zero-knowledge, Proof systems, Untraceability |
24 | Josep Domingo-Ferrer, Jordi Herrera-Joancomartí |
An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 27(4), pp. 62-67, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
security and electronic payment, anonymity, electronic commerce, intelligent agents, untraceability |
24 | Hideki Imai |
Information Security Aspects of Spread Spectrum Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 193-208, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Spread Spectrum System, Information Security, CDMA, Jamming, Cellular System, Untraceability |
18 | Huixian Li, Liaojun Pang |
A Novel Biometric-Based Authentication Scheme with Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 295-298, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Ton van Deursen, Sasa Radomirovic |
Algebraic Attacks on RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, pp. 38-51, 2009, Springer, 978-3-642-03943-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID, Formal verification, security protocols, attacks, algebraic methods |
18 | Xiangxi Li, Yu Zhang, Yuxin Deng |
Verifying Anonymous Credential Systems in Applied Pi Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 209-225, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Anonymous and Authenticated Key Exchange for Roaming Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 6(9), pp. 3461-3472, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Zhengqin Luo, Xiaojuan Cai, Jun Pang 0001, Yuxin Deng |
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 87-103, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Stefan Brands, Liesje Demuynck, Bart De Decker |
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 400-415, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Karim M. El Defrawy, Gene Tsudik |
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China, pp. 304-313, 2007, IEEE Computer Society, 1-4244-1588-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Marina Blanton, Mikhail J. Atallah |
Succinct representation of flexible and privacy-preserving access rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 15(4), pp. 334-354, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy-preserving access rights, Flexible access rights, Compact representation |
18 | Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
Solving Bao's Colluding Attack in Wang's Fair Payment Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 460-468, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | JaeCheol Ha, JungHoon Ha, Sang-Jae Moon, Colin Boyd |
LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUCT ![In: Ubiquitous Convergence Technology, First International Conference, ICUCT 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers, pp. 80-89, 2006, Springer, 978-3-540-71788-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Desynchronization attack, Privacy, Traceability, Mutual authentication, RFID system |
18 | Giuseppe Ciaccio |
Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 190-207, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong |
Recoverable and Untraceable E-Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 206-214, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Untraceable, E-Cash, Recoverable |
18 | Ramsés Morales, Indranil Gupta |
Providing both scale and security through a single core probabilistic protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 1st International Conference on Collaborative Computing: Networking, Applications and Worksharing, San Jose, CA, USA, December 19-21, 2005, 2005, IEEE Computer Society / ICST, 1-4244-0030-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Mark Manulis, Jörg Schwenk |
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, pp. 107-124, 2004, Springer, 3-540-24396-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Laurent Bussard, Refik Molva |
Establishing Trust with Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 199-209, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Chih-Hung Wang |
Untraceable Fair Network Payment Protocols with Off-Line TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 173-187, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signatures, Cryptography, Electronic Commerce, Undeniable Signature, Electronic cash, Payment System |
18 | Chun-I Fan, Chin-Laung Lei |
Secure Rewarding Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 7-10 January 1997, Maui, Hawaii, USA, pp. 571-580, 1997, IEEE Computer Society, 0-8186-7734-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
18 | Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto |
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, pp. 322-333, 1996, Springer, 3-540-61872-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
18 | Birgit Pfitzmann, Matthias Schunter, Michael Waidner |
How to Break Another Provably Secure Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 121-132, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
18 | Stefan Brands |
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 302-318, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
18 | Birgit Pfitzmann, Michael Waidner |
How To Break and Repair A "Provably Secure" Untraceable Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 338-350, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
18 | Jurjen N. Bos, Bert den Boer |
Detection of Disrupters in the DC Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 320-327, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
18 | Tatsuaki Okamoto, Kazuo Ohta |
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 481-496, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|