You are here

Bibliography

Export 84 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is C  [Clear All Filters]
2011
Calandrino JA, Kilzer A, Narayanan A, Felten EW, Shmatikov V. "You Might Also Like:" Privacy Risks of Collaborative Filtering. In: Security and Privacy (SP), 2011 IEEE Symposium on. Security and Privacy (SP), 2011 IEEE Symposium on. ; 2011.
2005
Camenisch J, Lysyanskaya A. A Formal Treatment of Onion Routing. In: Shoup V Proceedings of CRYPTO 2005. Proceedings of CRYPTO 2005. Springer-Verlag, LNCS 3621; 2005. pp. 169–187. Available from: http://www.springerlink.com/content/0jmg1krt9ph147ql/
2002
Camenisch J, Lysyanskaya A. A Signature Scheme with Efficient Protocols. In: Proceedings of SCN '02, Third Conference on Security in Communication Networks. Proceedings of SCN '02, Third Conference on Security in Communication Networks. Springer Verlag, LNCS 2576; 2002. pp. 268–289. Available from: http://www.springerlink.com/content/r66ywt172y06g5qr/
2005
Camenisch J, Mityagin A. Mix-network with Stronger Security. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 128–147. Available from: http://www.springerlink.com/content/v32m5122127m78v0/
2002
Camenisch J, Lysyanskaya A. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In: Proceedings of CRYPTO 2002. Proceedings of CRYPTO 2002. Springer Verlag, LNCS 2442; 2002. pp. 61–76. Available from: http://portal.acm.org/citation.cfm?id=704437
2005
Camenisch J, Hohenberger S, Lysyanskaya A. Compact E-Cash. In: Cramer R Proceedings of EUROCRYPT 2005. Vol. 3494. Proceedings of EUROCRYPT 2005. Springer; 2005. pp. 302–321. Available from: http://www.springerlink.com/content/vwkgkfpdmrdky5a8/
2002
Camenisch J, Herreweghen EV. Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002). Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002). New York, NY, USA: ACM Press; 2002. pp. 21–30. Available from: http://portal.acm.org/citation.cfm?id=586114
2003
Camenisch J, Shoup V. Practical Verifiable Encryption and Decryption of Discrete Logarithms. In: Proceedings of CRYPTO 2003. Proceedings of CRYPTO 2003. Springer Verlag, LNCS 2729; 2003. pp. 126–144. Available from: http://www.springerlink.com/content/wjbh5579hdfd66ed/
2001
Camenisch J, Lysyanskaya A. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01). Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '01). London, UK: Springer-Verlag; 2001. pp. 93–118. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.9429
2006
Camenisch J, Hohenberger S, Kohlweiss M, Lysyanskaya A, Meyerovich M. How to win the clonewars: efficient periodic n-times anonymous authentication. In: Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006). Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006). New York, NY, USA: ACM Press; 2006. pp. 201–210. Available from: http://portal.acm.org/citation.cfm?id=1180431
Campo C, García-Rubio C. DNS-Based Service Discovery in Ad Hoc Networks: Evaluation and Improvements. Springer Berlin / Heidelberg; 2006. Available from: http://www.springerlink.com/content/m8322m1006416270/
2002
Cao X-R, Shen H-X, Milito R, Wirth P. Internet pricing with a game theoretical approach: concepts and examples. IEEE/ACM Trans. Netw. [Internet]. 2002 ;10(2):208–216. Available from: http://dl.acm.org/citation.cfm?id=508325.508330
Capkun S, Buttyán L, Hubaux J-P. Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph. In: In Proceedings of The ACM New Security Paradigms Workshop. In Proceedings of The ACM New Security Paradigms Workshop. ACM Press; 2002. pp. 28–35. Available from: http://portal.acm.org/citation.cfm?id=844102.844108
Castro M, Druschel P, Hu CY. Exploiting network proximity in distributed hash tables. In: in International Workshop on Future Directions in Distributed Computing (FuDiCo. in International Workshop on Future Directions in Distributed Computing (FuDiCo. ; 2002. pp. 52–55. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.3062
2003
Castro M, Druschel P, Kermarrec A-M, Nandi A, Rowstron A, Singh A. SplitStream: high-bandwidth multicast in cooperative environments. SIGOPS'03 Operating Systems Review [Internet]. 2003 ;37(5):298–313. Available from: http://doi.acm.org/10.1145/1165389.945474
Castro M, Druschel P, Kermarrec A-M, Rowstron A. Scalable Application-level Anycast for Highly Dynamic Groups. In: NGC'03 Networked Group Communication, Fifth International COST264 Workshop. Vol. 2816. NGC'03 Networked Group Communication, Fifth International COST264 Workshop. Munich, Germany: Springer; 2003. pp. 47-57.
2001
Cattaneo G, Catuogno L, Sorbo AD, Persiano P. The Design and Implementation of a Transparent Cryptographic File System for UNIX. In: Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference. Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference. Boston, Massachusetts, USA: USENIX Association; 2001. pp. 199–212. Available from: http://dl.acm.org/citation.cfm?id=647054.715628

Pages