You are here

Bibliography

Export 9 results:
Author Title Type [ Year(Asc)]
Filters: Author is Jan Camenisch  [Clear All Filters]
2006
Camenisch J, Hohenberger S, Kohlweiss M, Lysyanskaya A, Meyerovich M. How to win the clonewars: efficient periodic n-times anonymous authentication. In: Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006). Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006). New York, NY, USA: ACM Press; 2006. pp. 201–210. Available from: http://portal.acm.org/citation.cfm?id=1180431
2005
Camenisch J, Hohenberger S, Lysyanskaya A. Compact E-Cash. In: Cramer R Proceedings of EUROCRYPT 2005. Vol. 3494. Proceedings of EUROCRYPT 2005. Springer; 2005. pp. 302–321. Available from: http://www.springerlink.com/content/vwkgkfpdmrdky5a8/
Camenisch J, Lysyanskaya A. A Formal Treatment of Onion Routing. In: Shoup V Proceedings of CRYPTO 2005. Proceedings of CRYPTO 2005. Springer-Verlag, LNCS 3621; 2005. pp. 169–187. Available from: http://www.springerlink.com/content/0jmg1krt9ph147ql/
Camenisch J, Mityagin A. Mix-network with Stronger Security. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 128–147. Available from: http://www.springerlink.com/content/v32m5122127m78v0/
2003
Camenisch J, Shoup V. Practical Verifiable Encryption and Decryption of Discrete Logarithms. In: Proceedings of CRYPTO 2003. Proceedings of CRYPTO 2003. Springer Verlag, LNCS 2729; 2003. pp. 126–144. Available from: http://www.springerlink.com/content/wjbh5579hdfd66ed/
2002
Camenisch J, Herreweghen EV. Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002). Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002). New York, NY, USA: ACM Press; 2002. pp. 21–30. Available from: http://portal.acm.org/citation.cfm?id=586114
Camenisch J, Lysyanskaya A. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In: Proceedings of CRYPTO 2002. Proceedings of CRYPTO 2002. Springer Verlag, LNCS 2442; 2002. pp. 61–76. Available from: http://portal.acm.org/citation.cfm?id=704437
Camenisch J, Lysyanskaya A. A Signature Scheme with Efficient Protocols. In: Proceedings of SCN '02, Third Conference on Security in Communication Networks. Proceedings of SCN '02, Third Conference on Security in Communication Networks. Springer Verlag, LNCS 2576; 2002. pp. 268–289. Available from: http://www.springerlink.com/content/r66ywt172y06g5qr/
2001
Camenisch J, Lysyanskaya A. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01). Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01). London, UK: Springer-Verlag; 2001. pp. 93–118. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.9429