Filter your results
- 5
- 1
- 4
- 1
- 1
- 6
- 2
- 2
- 1
- 1
- 6
- 1
- 6
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.463-478, ⟨10.1007/978-3-319-18467-8_31⟩
Conference papers
hal-01345136v1
|
||
|
Report on the Workshop on Assessing the Maturity of Privacy Enhancing TechnologiesDavid Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.97-110, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_7⟩
Book sections
hal-01619747v1
|
||
|
Privacy Design Strategies29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.446-459, ⟨10.1007/978-3-642-55415-5_38⟩
Conference papers
hal-01370395v1
|
||
|
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy. pp.261-273, ⟨10.1007/978-3-642-31668-5_20⟩
Conference papers
hal-01517599v1
|
||
|
On Linkability and Malleability in Self-blindable Credentials9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.203-218, ⟨10.1007/978-3-319-24018-3_13⟩
Conference papers
hal-01442543v1
|
||
|
ICT Systems Security and Privacy ProtectionSpringer, AICT-471, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-33629-9. ⟨10.1007/978-3-319-33630-5⟩
Books
hal-01369602v1
|