Formalising Linked-Data based Verifiable Credentials for Selective Disclosure | 0 | 0.34 | 2022 |
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part I. | 0 | 0.34 | 2021 |
Ledger-based Points Transfer System in LPWAN: From Disaster Management Aspect | 0 | 0.34 | 2021 |
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II. | 0 | 0.34 | 2021 |
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I. | 0 | 0.34 | 2019 |
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II. | 0 | 0.34 | 2019 |
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. | 0 | 0.34 | 2019 |
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I. | 0 | 0.34 | 2019 |
A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain | 0 | 0.34 | 2019 |
Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected Papers. | 0 | 0.34 | 2018 |
Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers | 16 | 1.53 | 2012 |
An implementation of a mix-net based network voting scheme and its use in a private organization | 7 | 0.51 | 2010 |
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers | 22 | 2.19 | 2010 |
RLCPS preface | 0 | 0.34 | 2010 |
K-Times Anonymous Authentication | 22 | 1.07 | 2009 |
IC card-based single sign-on system that remains secure under card analysis | 1 | 0.36 | 2009 |
Special Section on Cryptography and Information Security | 0 | 0.34 | 2008 |
An Efficient Publicly Verifiable Mix-Net for Long Inputs | 6 | 0.53 | 2007 |
k-times anonymous authentication with a constant proving cost | 26 | 1.14 | 2006 |
Using group signatures for identity management and its implementation | 11 | 0.56 | 2006 |
k-Times Anonymous Authentication (Extended Abstract) | 64 | 2.43 | 2004 |
An implementation of a universally verifiable electronic voting scheme based on shuffling | 25 | 1.22 | 2002 |
Efficient receipt-free voting based on homomorphic encryption | 209 | 9.60 | 2000 |
An Auction Protocol Which Hides Bids of Losers | 61 | 3.61 | 2000 |
Implementation of a Digital Lottery Server on WWW | 8 | 0.65 | 1999 |
Fault tolerant anonymous channel | 57 | 6.31 | 1997 |
Designated verifier proofs and their applications | 399 | 22.57 | 1996 |
Receipt-free mix-type voting scheme: a practical solution to the implementation of a voting booth | 198 | 14.13 | 1995 |
Secure Voting Using Partially Compatible Homomorphisms | 65 | 8.06 | 1994 |