Filter your results
- 3
- 2
- 1
- 3
- 1
- 1
- 1
- 3
- 1
- 3
- 2
- 1
- 1
- 1
|
|
sorted by
|
|
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.463-478, ⟨10.1007/978-3-319-18467-8_31⟩
Conference papers
hal-01345136v1
|
||
|
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.261-273, ⟨10.1007/978-3-642-31668-5_20⟩
Conference papers
hal-01517599v1
|
||
|
Mobile Devices to the Identity RescueMarit Hansen; Jaap-Henk Hoepman; Ronald Leenes; Diane Whitehouse. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, AICT-421, Springer, pp.237-247, 2014, IFIP Advances in Information and Communication Technology (TUTORIAL), 978-3-642-55136-9. ⟨10.1007/978-3-642-55137-6_19⟩
Book sections
hal-01276079v1
|