Efficient schemes for anonymous yet authorized and bounded use of cloud resources
From MaRDI portal
Publication:2889864
DOI10.1007/978-3-642-28496-0_5zbMATH Open1292.94137OpenAlexW2152581500MaRDI QIDQ2889864FDOQ2889864
Authors: Daniel Slamanig
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_5
Recommendations
Cites Work
- Fully homomorphic encryption using ideal lattices
- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology – CRYPTO 2004
- Oblivious transfer with hidden access control policies
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- Compact E-Cash
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Unclonable Group Identification
- Applied Cryptography and Network Security
- Divisible E-Cash Systems Can Be Truly Anonymous
- Title not available (Why is that?)
- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
Cited In (1)
This page was built for publication: Efficient schemes for anonymous yet authorized and bounded use of cloud resources
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889864)