Author of the publication

Sanitizable Signatures with Several Signers and Sanitizers.

, , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 35-52. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Lescuyer, Roch
add a person with the name Lescuyer, Roch
 

Other publications of authors with the same name

Hierarchical Identities from Group Signatures and Pseudonymous Signatures., , , and . The New Codebreakers, volume 9100 of Lecture Notes in Computer Science, page 457-469. Springer, (2016)Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage., , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 493-510. Springer, (2015)A Verifiable System for Automated Face Identification., , and . BIOSIG, volume P-260 of LNI, page 345-352. GI / IEEE, (2016)Protecting privacy by sanitizing personal data: a new approach to anonymous credentials., and . AsiaCCS, page 381-392. ACM, (2013)Delegating Biometric Authentication with the Sumcheck Protocol., , and . WISTP, volume 9895 of Lecture Notes in Computer Science, page 236-244. Springer, (2016)A Privacy-Preserving Contactless Transport Service for NFC Smartphones., , , , , and . MobiCASE, volume 130 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 282-285. Springer, (2013)Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents., , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 255-272. Springer, (2014)Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures., , , and . FM, volume 9109 of Lecture Notes in Computer Science, page 90-107. Springer, (2015)Searchable Encryption for Biometric Identification Revisited., , and . DPM/QASA@ESORICS, volume 9963 of Lecture Notes in Computer Science, page 113-129. Springer, (2016)Direct Anonymous Attestations with Dependent Basename Opening., , , and . CANS, volume 8813 of Lecture Notes in Computer Science, page 206-221. Springer, (2014)