Author of the publication

Towards Authenticity and Privacy Preserving Accountable Workflows.

, , , and . Privacy and Identity Management, volume 476 of IFIP Advances in Information and Communication Technology, page 170-186. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Authenticity and Privacy Preserving Accountable Workflows., , , and . Privacy and Identity Management, volume 476 of IFIP Advances in Information and Communication Technology, page 170-186. Springer, (2015)On cloud storage and the cloud of clouds approach., and . ICITST, page 649-655. IEEE, (2012)A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials., , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 57-74. Springer, (2015)Blank digital signatures., and . AsiaCCS, page 95-106. ACM, (2013)Group Signatures on Mobile Devices: Practical Experiences., , , , , and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 47-64. Springer, (2013)Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials., and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 491-511. Springer, (2014)Blank Digital Signatures: Optimization and Practical Experiences., , and . Privacy and Identity Management, volume 457 of IFIP Advances in Information and Communication Technology, page 201-215. Springer, (2014)Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials., , and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 49-65. Springer, (2014)Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves., and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 155-167. Springer, (2013)Practical Round-Optimal Blind Signatures in the Standard Model., , and . CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 233-253. Springer, (2015)