共 22 条
[1]
[Anonymous], P 7 ACM WORKSH DIG I
[2]
Begum N., 2012, INT C INF SECUR CRYP, P495
[3]
Multifactor Identity Verification Using Aggregated Proof of Knowledge
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2010, 40 (04)
:372-383
[4]
Bjones Ronny, 2014, Privacy Technologies and Policy. First Annual Privacy Forum, APF 2012. Revised Selected Papers: LNCS 8319, P111, DOI 10.1007/978-3-642-54069-1_7
[5]
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[6]
Boudot F, 2000, LECT NOTES COMPUT SC, V1807, P431
[7]
Camenisch J, 2004, LECT NOTES COMPUT SC, V3152, P56
[9]
Camenisch J, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P345
[10]
Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P481