Efficient schemes for anonymous yet authorized and bounded use of cloud resources
From MaRDI portal
Publication:2889864
Recommendations
Cites work
- scientific article; zbMATH DE number 4057443 (Why is no real title available?)
- scientific article; zbMATH DE number 1186869 (Why is no real title available?)
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 708798 (Why is no real title available?)
- scientific article; zbMATH DE number 1030975 (Why is no real title available?)
- scientific article; zbMATH DE number 1088250 (Why is no real title available?)
- scientific article; zbMATH DE number 1952906 (Why is no real title available?)
- scientific article; zbMATH DE number 1759784 (Why is no real title available?)
- scientific article; zbMATH DE number 1406779 (Why is no real title available?)
- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
- Advances in Cryptology – CRYPTO 2004
- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
- Applied Cryptography and Network Security
- Compact E-Cash
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- Divisible E-Cash Systems Can Be Truly Anonymous
- Fully homomorphic encryption using ideal lattices
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Oblivious transfer with hidden access control policies
- Unclonable Group Identification
Cited in
(1)
This page was built for publication: Efficient schemes for anonymous yet authorized and bounded use of cloud resources
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889864)