Author of the publication

Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers.

, , , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 463-478. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revocable Privacy: Principles, Use Cases, and Technologies., , and . APF, volume 9484 of Lecture Notes in Computer Science, page 124-143. Springer, (2015)Epidose: A privacy-preserving epidemic dosimeter based on contact tracing., , , , , , , and . (May 2021)Vote to Link: Recovering from Misbehaving Anonymous Users., , and . WPES@CCS, page 111-122. ACM, (2016)On Linkability and Malleability in Self-blindable Credentials., , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 203-218. Springer, (2015)19th Workshop on Privacy in the Electronic Society (WPES 2020)., and . ACM Conference on Computer and Communications Security, page 2141-2142. ACM, (2020)Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers., , , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 463-478. Springer, (2015)zksk: A Library for Composable Zero-Knowledge Proofs., , , , and . WPES@CCS, page 50-54. ACM, (2019)VoteAgain: A scalable coercion-resistant voting system., , and . USENIX Security Symposium, page 1553-1570. USENIX Association, (2020)Designated Attribute-Based Proofs for RFID Applications., , and . RFIDSec, volume 7739 of Lecture Notes in Computer Science, page 59-75. Springer, (2012)Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications., , , , , , , , , and . Frontiers Digit. Health, (2021)