You are here

Bibliography

Export 6 results:
Author Title Type [ Year(Asc)]
Filters: Author is Anna Lysyanskaya  [Clear All Filters]
2006
Camenisch J, Hohenberger S, Kohlweiss M, Lysyanskaya A, Meyerovich M. How to win the clonewars: efficient periodic n-times anonymous authentication. In: Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006). Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006). New York, NY, USA: ACM Press; 2006. pp. 201–210. Available from: http://portal.acm.org/citation.cfm?id=1180431
2005
Camenisch J, Hohenberger S, Lysyanskaya A. Compact E-Cash. In: Cramer R Proceedings of EUROCRYPT 2005. Vol. 3494. Proceedings of EUROCRYPT 2005. Springer; 2005. pp. 302–321. Available from: http://www.springerlink.com/content/vwkgkfpdmrdky5a8/
Camenisch J, Lysyanskaya A. A Formal Treatment of Onion Routing. In: Shoup V Proceedings of CRYPTO 2005. Proceedings of CRYPTO 2005. Springer-Verlag, LNCS 3621; 2005. pp. 169–187. Available from: http://www.springerlink.com/content/0jmg1krt9ph147ql/
2002
Camenisch J, Lysyanskaya A. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In: Proceedings of CRYPTO 2002. Proceedings of CRYPTO 2002. Springer Verlag, LNCS 2442; 2002. pp. 61–76. Available from: http://portal.acm.org/citation.cfm?id=704437
Camenisch J, Lysyanskaya A. A Signature Scheme with Efficient Protocols. In: Proceedings of SCN '02, Third Conference on Security in Communication Networks. Proceedings of SCN '02, Third Conference on Security in Communication Networks. Springer Verlag, LNCS 2576; 2002. pp. 268–289. Available from: http://www.springerlink.com/content/r66ywt172y06g5qr/
2001
Camenisch J, Lysyanskaya A. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01). Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01). London, UK: Springer-Verlag; 2001. pp. 93–118. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.9429