Hierarchical Identities from Group Signatures and Pseudonymous Signatures. | 1 | 0.35 | 2016 |
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. | 7 | 0.75 | 2014 |
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification | 19 | 0.71 | 2014 |
On Minimal and Quasi-minimal Linear Codes. | 9 | 0.64 | 2013 |
Collusion-Resistant Domain-Specific Pseudonymous Signatures. | 3 | 0.44 | 2013 |
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends | 31 | 0.91 | 2013 |
Cross-Unlinkable Hierarchical Group Signatures. | 2 | 0.42 | 2012 |
VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks. | 5 | 0.44 | 2012 |
Faster secure computation for biometric identification using filtering. | 12 | 0.62 | 2012 |
SHADE: Secure HAmming DistancE computation from oblivious transfer. | 17 | 0.70 | 2012 |
Secure Network Coding And Non-Malleable Codes: Protection Against Linear Tampering | 9 | 0.61 | 2012 |
An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management. | 1 | 0.36 | 2012 |
Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check. | 2 | 0.38 | 2011 |
Non-Malleable Codes From The Wire-Tap Channel | 10 | 0.70 | 2011 |