Author of the publication

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication.

, , , , , and . IDMAN, volume 396 of IFIP Advances in Information and Communication Technology, page 34-52. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing., , and . INDOCRYPT, volume 11898 of Lecture Notes in Computer Science, page 273-296. Springer, (2019)Concepts and languages for privacy-preserving attribute-based authentication., , , , , , and . J. Inf. Secur. Appl., 19 (1): 25-44 (2014)Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain., , and . ACM Conference on Computer and Communications Security, page 683-699. ACM, (2017)Oblivious Transfer with Hidden Access Control Policies., , , and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 192-209. Springer, (2011)On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware., , and . IACR Cryptology ePrint Archive, (2010)Composable and Modular Anonymous Credentials: Definitions and Practical Constructions., , , and . ASIACRYPT (2), volume 9453 of Lecture Notes in Computer Science, page 262-288. Springer, (2015)Universally composable adaptive oblivious transfer (with access control) from standard assumptions., , , and . Digital Identity Management, page 1-12. ACM, (2013)Efficient Fully Secure Leakage-Deterring Encryption., , and . IMACC, volume 11929 of Lecture Notes in Computer Science, page 102-127. Springer, (2019)Cryptographic Mechanisms for Privacy., , , , and . Privacy and Identity Management for Life, Springer, (2011)Composable & Modular Anonymous Credentials: Definitions and Practical Constructions., , , and . IACR Cryptology ePrint Archive, (2015)