共 243 条
[51]
Camenisch J., 2001, P INT C THEOR APPL C
[52]
(Un)linkable Pseudonyms for Governmental Databases
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1467-1479
[53]
Privacy-Preserving User-Auditable Pseudonym Systems
[J].
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P),
2017,
:269-284
[54]
Canard S., 2012, P 5 INT C CRYPT AFR
[55]
Canard S., 2010, P 2010 INT C TOP CRY
[56]
Canard S., 2013, P 8 ACM SIGSAC S INF
[57]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[59]
Cas J, 2011, COMPUTERS, PRIVACY AND DATA PROTECTION: AN ELEMENT OF CHOICE, P139, DOI 10.1007/978-94-007-0641-5_7
[60]
Chase M., 2014, P 2014 IEEE 27 COMP