BibTeX records: Jan Camenisch

download as .bib file

@inproceedings{DBLP:conf/acns/BoschiniCN18,
  author    = {Cecilia Boschini and
               Jan Camenisch and
               Gregory Neven},
  title     = {Floppy-Sized Group Signatures from Lattices},
  booktitle = {Applied Cryptography and Network Security - 16th International Conference,
               {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  pages     = {163--182},
  year      = {2018},
  crossref  = {DBLP:conf/acns/2018},
  url       = {https://doi.org/10.1007/978-3-319-93387-0\_9},
  doi       = {10.1007/978-3-319-93387-0\_9},
  timestamp = {Wed, 13 Jun 2018 13:59:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/BoschiniCN18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischDGLN18,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Tommaso Gagliardoni and
               Anja Lehmann and
               Gregory Neven},
  title     = {The Wonderful World of Global Random Oracles},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  pages     = {280--312},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-1},
  url       = {https://doi.org/10.1007/978-3-319-78381-9\_11},
  doi       = {10.1007/978-3-319-78381-9\_11},
  timestamp = {Sat, 05 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischDGLN18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BoschiniCN18,
  author    = {Cecilia Boschini and
               Jan Camenisch and
               Gregory Neven},
  title     = {Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs},
  booktitle = {Information Security - 21st International Conference, {ISC} 2018,
               Guildford, UK, September 9-12, 2018, Proceedings},
  pages     = {3--22},
  year      = {2018},
  crossref  = {DBLP:conf/isw/2018},
  url       = {https://doi.org/10.1007/978-3-319-99136-8\_1},
  doi       = {10.1007/978-3-319-99136-8\_1},
  timestamp = {Mon, 03 Sep 2018 13:50:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/BoschiniCN18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2018,
  editor    = {Jan Camenisch and
               Panos Papadimitratos},
  title     = {Cryptology and Network Security - 17th International Conference, {CANS}
               2018, Naples, Italy, September 30 - October 3, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11124},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-00434-7},
  doi       = {10.1007/978-3-030-00434-7},
  isbn      = {978-3-030-00433-0},
  timestamp = {Fri, 21 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2017,
  editor    = {Carlisle Adams and
               Jan Camenisch},
  title     = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
               Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10719},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-72565-9},
  doi       = {10.1007/978-3-319-72565-9},
  isbn      = {978-3-319-72564-2},
  timestamp = {Fri, 12 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDGLN18,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Tommaso Gagliardoni and
               Anja Lehmann and
               Gregory Neven},
  title     = {The Wonderful World of Global Random Oracles},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {165},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/165},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDGLN18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KassemCBKCH18,
  author    = {Nada E. L. Kassem and
               Liqun Chen and
               Rachid El Bansarkhani and
               Ali {El Kaafarani} and
               Jan Camenisch and
               Patrick Hough},
  title     = {{L-DAA:} Lattice-Based Direct Anonymous Attestation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {401},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/401},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KassemCBKCH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoschiniCN18,
  author    = {Cecilia Boschini and
               Jan Camenisch and
               Gregory Neven},
  title     = {Floppy-Sized Group Signatures from Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {453},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/453},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BoschiniCN18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BeckCDKPSS17,
  author    = {Michael Till Beck and
               Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Practical Strongly Invisible and Strongly Accountable Sanitizable
               Signatures},
  booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
               2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  pages     = {437--452},
  year      = {2017},
  crossref  = {DBLP:conf/acisp/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-60055-0\_23},
  doi       = {10.1007/978-3-319-60055-0\_23},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BeckCDKPSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischDD17,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Maria Dubovitskaya},
  title     = {Practical UC-Secure Delegatable Credentials with Attributes and Their
               Application to Blockchain},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {683--699},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {https://doi.org/10.1145/3133956.3134025},
  doi       = {10.1145/3133956.3134025},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CamenischDD17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischDL17,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  title     = {Anonymous Attestation with Subverted TPMs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {III}},
  pages     = {427--461},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-3},
  url       = {https://doi.org/10.1007/978-3-319-63697-9\_15},
  doi       = {10.1007/978-3-319-63697-9\_15},
  timestamp = {Mon, 14 Aug 2017 14:44:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischDL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CamenischLNS17,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Kai Samelin},
  title     = {UC-Secure Non-interactive Public-Key Encryption},
  booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
               Barbara, CA, USA, August 21-25, 2017},
  pages     = {217--233},
  year      = {2017},
  crossref  = {DBLP:conf/csfw/2017},
  url       = {https://doi.org/10.1109/CSF.2017.14},
  doi       = {10.1109/CSF.2017.14},
  timestamp = {Mon, 16 Oct 2017 15:00:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/CamenischLNS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/CamenischL17,
  author    = {Jan Camenisch and
               Anja Lehmann},
  title     = {Privacy-Preserving User-Auditable Pseudonym Systems},
  booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  pages     = {269--284},
  year      = {2017},
  crossref  = {DBLP:conf/eurosp/2017},
  url       = {https://doi.org/10.1109/EuroSP.2017.36},
  doi       = {10.1109/EuroSP.2017.36},
  timestamp = {Wed, 12 Jul 2017 09:52:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/CamenischL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BaldimtsiCDLRSY17,
  author    = {Foteini Baldimtsi and
               Jan Camenisch and
               Maria Dubovitskaya and
               Anna Lysyanskaya and
               Leonid Reyzin and
               Kai Samelin and
               Sophia Yakoubov},
  title     = {Accumulators with Applications to Anonymity-Preserving Revocation},
  booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  pages     = {301--315},
  year      = {2017},
  crossref  = {DBLP:conf/eurosp/2017},
  url       = {https://doi.org/10.1109/EuroSP.2017.13},
  doi       = {10.1109/EuroSP.2017.13},
  timestamp = {Wed, 12 Jul 2017 09:52:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/BaldimtsiCDLRSY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CachinCFL17,
  author    = {Christian Cachin and
               Jan Camenisch and
               Eduarda Freire{-}St{\"{o}}gbuchner and
               Anja Lehmann},
  title     = {Updatable Tokenization: Formal Definitions and Provably Secure Constructions},
  booktitle = {Financial Cryptography and Data Security - 21st International Conference,
               {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  pages     = {59--75},
  year      = {2017},
  crossref  = {DBLP:conf/fc/2017},
  url       = {https://doi.org/10.1007/978-3-319-70972-7\_4},
  doi       = {10.1007/978-3-319-70972-7\_4},
  timestamp = {Tue, 02 Jan 2018 13:47:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fc/CachinCFL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Camenisch17,
  author    = {Jan Camenisch},
  title     = {Directions in Security Research},
  booktitle = {Proceedings of the 14th International Joint Conference on e-Business
               and Telecommunications {(ICETE} 2017) - Volume 1: DCNET, Madrid, Spain,
               July 24-26, 2017.},
  pages     = {7},
  year      = {2017},
  crossref  = {DBLP:conf/icete/2017d},
  timestamp = {Wed, 29 Aug 2018 15:13:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icete/Camenisch17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDKPSS17,
  author    = {Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible
               Sanitizable Signatures},
  booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  pages     = {152--182},
  year      = {2017},
  crossref  = {DBLP:conf/pkc/2017-2},
  url       = {https://doi.org/10.1007/978-3-662-54388-7\_6},
  doi       = {10.1007/978-3-662-54388-7\_6},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/CamenischDKPSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CamenischCDLNU17,
  author    = {Jan Camenisch and
               Liqun Chen and
               Manu Drijvers and
               Anja Lehmann and
               David Novick and
               Rainer Urian},
  title     = {One {TPM} to Bind Them All: Fixing {TPM} 2.0 for Provably Secure Anonymous
               Attestation},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {901--920},
  year      = {2017},
  crossref  = {DBLP:conf/sp/2017},
  url       = {https://doi.org/10.1109/SP.2017.22},
  doi       = {10.1109/SP.2017.22},
  timestamp = {Tue, 27 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/CamenischCDLNU17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/NevenBCN17,
  author    = {Gregory Neven and
               Gianmarco Baldini and
               Jan Camenisch and
               Ricardo Neisse},
  title     = {Privacy-preserving attribute-based credentials in cooperative intelligent
               transport systems},
  booktitle = {2017 {IEEE} Vehicular Networking Conference, {VNC} 2017, Torino, Italy,
               November 27-29, 2017},
  pages     = {131--138},
  year      = {2017},
  crossref  = {DBLP:conf/vnc/2017},
  url       = {https://doi.org/10.1109/VNC.2017.8275631},
  doi       = {10.1109/VNC.2017.8275631},
  timestamp = {Sun, 04 Feb 2018 13:00:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vnc/NevenBCN17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDKPSS17,
  author    = {Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible
               Sanitizable Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {11},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/011},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDKPSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischL17,
  author    = {Jan Camenisch and
               Anja Lehmann},
  title     = {Privacy for Distributed Databases via (Un)linkable Pseudonyms},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {22},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/022},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiCDLRSY17,
  author    = {Foteini Baldimtsi and
               Jan Camenisch and
               Maria Dubovitskaya and
               Anna Lysyanskaya and
               Leonid Reyzin and
               Kai Samelin and
               Sophia Yakoubov},
  title     = {Accumulators with Applications to Anonymity-Preserving Revocation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {43},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/043},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BaldimtsiCDLRSY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDL17,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  title     = {Anonymous Attestation with Subverted TPMs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {200},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/200},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckCDKPSS17,
  author    = {Michael Till Beck and
               Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Practical Strongly Invisible and Strongly Accountable Sanitizable
               Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {445},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/445},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BeckCDKPSS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCDLNU17,
  author    = {Jan Camenisch and
               Liqun Chen and
               Manu Drijvers and
               Anja Lehmann and
               David Novick and
               Rainer Urian},
  title     = {One {TPM} to Bind Them All: Fixing {TPM} 2.0 for Provably Secure Anonymous
               Attestation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {639},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/639},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischCDLNU17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinCFL17,
  author    = {Christian Cachin and
               Jan Camenisch and
               Eduarda Freire{-}Stoegbuchner and
               Anja Lehmann},
  title     = {Updatable Tokenization: Formal Definitions and Provably Secure Constructions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {695},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/695},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CachinCFL17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoschiniCN17,
  author    = {Cecilia Boschini and
               Jan Camenisch and
               Gregory Neven},
  title     = {Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1123},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1123},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BoschiniCN17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischEKK016,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Stephan Krenn and
               Ralf K{\"{u}}sters and
               Daniel Rausch},
  title     = {Universal Composition with Responsive Environments},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  pages     = {807--840},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-53890-6\_27},
  doi       = {10.1007/978-3-662-53890-6\_27},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/CamenischEKK016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischDR16,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Alfredo Rial},
  title     = {{UC} Commitments for Modular Protocol Design and Applications to Revocation
               and Attribute Tokens},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {III}},
  pages     = {208--239},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-3},
  url       = {https://doi.org/10.1007/978-3-662-53015-3\_8},
  doi       = {10.1007/978-3-662-53015-3\_8},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischDR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDL16,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  title     = {Universally Composable Direct Anonymous Attestation},
  booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
               March 6-9, 2016, Proceedings, Part {II}},
  pages     = {234--264},
  year      = {2016},
  crossref  = {DBLP:conf/pkc/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-49387-8\_10},
  doi       = {10.1007/978-3-662-49387-8\_10},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/CamenischDL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischEM16,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Ueli Maurer},
  title     = {Memory Erasability Amplification},
  booktitle = {Security and Cryptography for Networks - 10th International Conference,
               {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  pages     = {104--125},
  year      = {2016},
  crossref  = {DBLP:conf/scn/2016},
  url       = {https://doi.org/10.1007/978-3-319-44618-9\_6},
  doi       = {10.1007/978-3-319-44618-9\_6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischEM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischLNS16,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Kai Samelin},
  title     = {Virtual Smart Cards: How to Sign with a Password and a Server},
  booktitle = {Security and Cryptography for Networks - 10th International Conference,
               {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  pages     = {353--371},
  year      = {2016},
  crossref  = {DBLP:conf/scn/2016},
  url       = {https://doi.org/10.1007/978-3-319-44618-9\_19},
  doi       = {10.1007/978-3-319-44618-9\_19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischLNS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CamenischDL16,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  title     = {Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited},
  booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
               2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  pages     = {1--20},
  year      = {2016},
  crossref  = {DBLP:conf/trust/2016},
  url       = {https://doi.org/10.1007/978-3-319-45572-3\_1},
  doi       = {10.1007/978-3-319-45572-3\_1},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/CamenischDL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CamenischDH16,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Jan Hajny},
  title     = {Scalable Revocation Scheme for Anonymous Credentials Based on n-times
               Unlinkable Proofs},
  booktitle = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
               Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages     = {123--133},
  year      = {2016},
  crossref  = {DBLP:conf/wpes/2016},
  url       = {http://dl.acm.org/citation.cfm?id=2994625},
  timestamp = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/CamenischDH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-4/2015,
  editor    = {Jan Camenisch and
               Dogan Kesdogan},
  title     = {Open Problems in Network Security - {IFIP} {WG} 11.4 International
               Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9591},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-39028-4},
  doi       = {10.1007/978-3-319-39028-4},
  isbn      = {978-3-319-39027-7},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifip11-4/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2015,
  editor    = {David Aspinall and
               Jan Camenisch and
               Marit Hansen and
               Simone Fischer{-}H{\"{u}}bner and
               Charles D. Raab},
  title     = {Privacy and Identity Management. Time for a Revolution? - 10th {IFIP}
               {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer
               School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {476},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-41763-9},
  doi       = {10.1007/978-3-319-41763-9},
  isbn      = {978-3-319-41762-2},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEKKR16,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Stephan Krenn and
               Ralf K{\"{u}}sters and
               Daniel Rausch},
  title     = {Universal Composition with Responsive Environments},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {34},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/034},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischEKKR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDR16,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Alfredo Rial},
  title     = {{UC} Commitments for Modular Protocol Design and Applications to Revocation
               and Attribute Tokens},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {581},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/581},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDL16,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  title     = {Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {663},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/663},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDL16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEM16,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Ueli Maurer},
  title     = {Memory Erasability Amplification},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {706},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/706},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischEM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AhnBCHSW15,
  author    = {Jae Hyun Ahn and
               Dan Boneh and
               Jan Camenisch and
               Susan Hohenberger and
               Abhi Shelat and
               Brent Waters},
  title     = {Computing on Authenticated Data},
  journal   = {J. Cryptology},
  volume    = {28},
  number    = {2},
  pages     = {351--395},
  year      = {2015},
  url       = {https://doi.org/10.1007/s00145-014-9182-0},
  doi       = {10.1007/s00145-014-9182-0},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/AhnBCHSW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaldimtsiCHKLN15,
  author    = {Foteini Baldimtsi and
               Jan Camenisch and
               Lucjan Hanzlik and
               Stephan Krenn and
               Anja Lehmann and
               Gregory Neven},
  title     = {Recovering Lost Device-Bound Credentials},
  booktitle = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  pages     = {307--327},
  year      = {2015},
  crossref  = {DBLP:conf/acns/2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7\_15},
  doi       = {10.1007/978-3-319-28166-7\_15},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/BaldimtsiCHKLN15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischDHK15,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Kristiyan Haralambiev and
               Markulf Kohlweiss},
  title     = {Composable and Modular Anonymous Credentials: Definitions and Practical
               Constructions},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  pages     = {262--288},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48800-3\_11},
  doi       = {10.1007/978-3-662-48800-3\_11},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/CamenischDHK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischLN15,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven},
  title     = {Optimal Distributed Password Verification},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {182--194},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {https://doi.org/10.1145/2810103.2813722},
  doi       = {10.1145/2810103.2813722},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CamenischLN15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischL15,
  author    = {Jan Camenisch and
               Anja Lehmann},
  title     = {(Un)linkable Pseudonyms for Governmental Databases},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {1467--1479},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {https://doi.org/10.1145/2810103.2813658},
  doi       = {10.1145/2810103.2813658},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CamenischL15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischEN15,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Gregory Neven},
  title     = {Two-Server Password-Authenticated Secret Sharing UC-Secure Against
               Transient Corruptions},
  booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  pages     = {283--307},
  year      = {2015},
  crossref  = {DBLP:conf/pkc/2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2\_13},
  doi       = {10.1007/978-3-662-46447-2\_13},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/CamenischEN15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CamenischKLMNP15,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Anja Lehmann and
               Gert L{\ae}ss{\o}e Mikkelsen and
               Gregory Neven and
               Michael {\O}stergaard Pedersen},
  title     = {Formal Treatment of Privacy-Enhancing Credential Systems},
  booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
               Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  pages     = {3--24},
  year      = {2015},
  crossref  = {DBLP:conf/sacrypt/2015},
  url       = {https://doi.org/10.1007/978-3-319-31301-6\_1},
  doi       = {10.1007/978-3-319-31301-6\_1},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/CamenischKLMNP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CamenischOP15,
  author    = {Jan Camenisch and
               Diego Alejandro Ortiz{-}Yepes and
               Franz{-}Stefan Preiss},
  title     = {Strengthening Authentication with Privacy-Preserving Location Verification
               of Mobile Phones},
  booktitle = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  pages     = {37--48},
  year      = {2015},
  crossref  = {DBLP:conf/wpes/2015},
  url       = {https://doi.org/10.1145/2808138.2808144},
  doi       = {10.1145/2808138.2808144},
  timestamp = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/CamenischOP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/BichselCDEKKLNPPRS15,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Stephan Krenn and
               Ioannis Krontiris and
               Anja Lehmann and
               Gregory Neven and
               Christian Paquin and
               Franz{-}Stefan Preiss and
               Kai Rannenberg and
               Ahmad Sabouri},
  title     = {An Architecture for Privacy-ABCs},
  booktitle = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  pages     = {11--78},
  year      = {2015},
  crossref  = {DBLP:books/daglib/0039026},
  url       = {https://doi.org/10.1007/978-3-319-14439-9\_2},
  doi       = {10.1007/978-3-319-14439-9\_2},
  timestamp = {Tue, 16 May 2017 14:01:41 +0200},
  biburl    = {https://dblp.org/rec/bib/books/daglib/p/BichselCDEKKLNPPRS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/BichselCDEKLNP15,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Stephan Krenn and
               Anja Lehmann and
               Gregory Neven and
               Franz{-}Stefan Preiss},
  title     = {Cryptographic Protocols Underlying Privacy-ABCs},
  booktitle = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  pages     = {79--108},
  year      = {2015},
  crossref  = {DBLP:books/daglib/0039026},
  url       = {https://doi.org/10.1007/978-3-319-14439-9\_3},
  doi       = {10.1007/978-3-319-14439-9\_3},
  timestamp = {Tue, 16 May 2017 14:01:41 +0200},
  biburl    = {https://dblp.org/rec/bib/books/daglib/p/BichselCDEKLNP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/RannenbergCST15,
  author    = {Kai Rannenberg and
               Jan Camenisch and
               Ahmad Sabouri and
               Welderufael Tesfay},
  title     = {Further Challenges},
  booktitle = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  pages     = {361--367},
  year      = {2015},
  crossref  = {DBLP:books/daglib/0039026},
  url       = {https://doi.org/10.1007/978-3-319-14439-9\_12},
  doi       = {10.1007/978-3-319-14439-9\_12},
  timestamp = {Tue, 16 May 2017 14:01:41 +0200},
  biburl    = {https://dblp.org/rec/bib/books/daglib/p/RannenbergCST15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0039026,
  editor    = {Kai Rannenberg and
               Jan Camenisch and
               Ahmad Sabouri},
  title     = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-14439-9},
  doi       = {10.1007/978-3-319-14439-9},
  isbn      = {978-3-319-14438-2},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/books/daglib/0039026},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2014,
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Marit Hansen},
  title     = {Privacy and Identity Management for the Future Internet in the Age
               of Globalisation - 9th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG
               9.2.2 International Summer School, Patras, Greece, September 7-12,
               2014, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {457},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-18621-4},
  doi       = {10.1007/978-3-319-18621-4},
  isbn      = {978-3-319-18620-7},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/CamenischLLN15,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Anna Lysyanskaya and
               Gregory Neven},
  title     = {A Single Password for Everything?},
  journal   = {{ERCIM} News},
  volume    = {2015},
  number    = {100},
  year      = {2015},
  url       = {http://ercim-news.ercim.eu/en100/r-i/a-single-password-for-everything},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ercim/CamenischLLN15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEN15,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Gregory Neven},
  title     = {Two-Server Password-Authenticated Secret Sharing UC-Secure Against
               Transient Corruptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {6},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/006},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischEN15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDHK15,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Kristiyan Haralambiev and
               Markulf Kohlweiss},
  title     = {Composable {\&} Modular Anonymous Credentials: Definitions and
               Practical Constructions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {580},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/580},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDHK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLNS15,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Kai Samelin},
  title     = {Virtual Smart Cards: How to Sign with a Password and a Server},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1101},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1101},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischLNS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDL15,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  title     = {Universally Composable Direct Anonymous Attestation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1246},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1246},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDL15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CamenischDELNPP14,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Anja Lehmann and
               Gregory Neven and
               Christian Paquin and
               Franz{-}Stefan Preiss},
  title     = {Concepts and languages for privacy-preserving attribute-based authentication},
  journal   = {J. Inf. Sec. Appl.},
  volume    = {19},
  number    = {1},
  pages     = {25--44},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.jisa.2014.03.004},
  doi       = {10.1016/j.jisa.2014.03.004},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/istr/CamenischDELNPP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BenhamoudaCKLN14,
  author    = {Fabrice Benhamouda and
               Jan Camenisch and
               Stephan Krenn and
               Vadim Lyubashevsky and
               Gregory Neven},
  title     = {Better Zero-Knowledge Proofs for Lattice Encryption and Their Application
               to Group Signatures},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  pages     = {551--572},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-45611-8\_29},
  doi       = {10.1007/978-3-662-45611-8\_29},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BenhamoudaCKLN14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischLLN14,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Anna Lysyanskaya and
               Gregory Neven},
  title     = {Memento: How to Reconstruct Your Secrets from a Single Password in
               a Hostile Environment},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  pages     = {256--275},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-2},
  url       = {https://doi.org/10.1007/978-3-662-44381-1\_15},
  doi       = {10.1007/978-3-662-44381-1\_15},
  timestamp = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischLLN14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischLNR14,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Alfredo Rial},
  title     = {Privacy-Preserving Auditing for Attribute-Based Credentials},
  booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {II}},
  pages     = {109--127},
  year      = {2014},
  crossref  = {DBLP:conf/esorics/2014-2},
  url       = {https://doi.org/10.1007/978-3-319-11212-1\_7},
  doi       = {10.1007/978-3-319-11212-1\_7},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/CamenischLNR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AbeCDD14,
  author    = {Masayuki Abe and
               Jan Camenisch and
               Rafael Dowsley and
               Maria Dubovitskaya},
  title     = {On the Impossibility of Structure-Preserving Deterministic Primitives},
  booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  pages     = {713--738},
  year      = {2014},
  crossref  = {DBLP:conf/tcc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8\_30},
  doi       = {10.1007/978-3-642-54242-8\_30},
  timestamp = {Fri, 02 Nov 2018 09:44:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/AbeCDD14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AyedBCH14,
  author    = {Dhouha Ayed and
               Patrik Bichsel and
               Jan Camenisch and
               Jerry den Hartog},
  title     = {Integration of Data-Minimising Authentication into Authorisation Systems},
  booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
               2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  pages     = {179--187},
  year      = {2014},
  crossref  = {DBLP:conf/trust/2014},
  url       = {https://doi.org/10.1007/978-3-319-08593-7\_12},
  doi       = {10.1007/978-3-319-08593-7\_12},
  timestamp = {Wed, 14 Nov 2018 10:59:33 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trust/AyedBCH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2014,
  editor    = {Sherman S. M. Chow and
               Jan Camenisch and
               Lucas Chi Kwong Hui and
               Siu{-}Ming Yiu},
  title     = {Information Security - 17th International Conference, {ISC} 2014,
               Hong Kong, China, October 12-14, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8783},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13257-0},
  doi       = {10.1007/978-3-319-13257-0},
  isbn      = {978-3-319-13256-3},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLLN14,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Anna Lysyanskaya and
               Gregory Neven},
  title     = {Memento: How to Reconstruct your Secrets from a Single Password in
               a Hostile Environment},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {429},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/429},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischLLN14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLNR14,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Alfredo Rial},
  title     = {Privacy-Preserving Auditing for Attribute-Based Credentials},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {468},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/468},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischLNR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKLMNP14a,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Anja Lehmann and
               Gert L{\ae}ss{\o}e Mikkelsen and
               Gregory Neven and
               Michael {\O}stergaard Pedersen},
  title     = {Formal Treatment of Privacy-Enhancing Credential Systems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {708},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/708},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischKLMNP14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/CamenischL13,
  author    = {Jan Camenisch and
               Costas Lambrinoudakis},
  title     = {Guest editors' introduction},
  journal   = {Mathematical and Computer Modelling},
  volume    = {57},
  number    = {7-8},
  pages     = {1577},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.mcm.2013.02.005},
  doi       = {10.1016/j.mcm.2013.02.005},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/mcm/CamenischL13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DongCCR13,
  author    = {Changyu Dong and
               Liqun Chen and
               Jan Camenisch and
               Giovanni Russello},
  title     = {Fair Private Set Intersection with a Semi-trusted Arbiter},
  booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
               Proceedings},
  pages     = {128--144},
  year      = {2013},
  crossref  = {DBLP:conf/dbsec/2013},
  url       = {https://doi.org/10.1007/978-3-642-39256-6\_9},
  doi       = {10.1007/978-3-642-39256-6\_9},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/DongCCR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/AbeCDN13,
  author    = {Masayuki Abe and
               Jan Camenisch and
               Maria Dubovitskaya and
               Ryo Nishimaki},
  title     = {Universally composable adaptive oblivious transfer (with access control)
               from standard assumptions},
  booktitle = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Berlin, Germany, November 8, 2013},
  pages     = {1--12},
  year      = {2013},
  crossref  = {DBLP:conf/dim/2013},
  url       = {https://doi.org/10.1145/2517881.2517883},
  doi       = {10.1145/2517881.2517883},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/AbeCDN13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischES13,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Victor Shoup},
  title     = {Practical and Employable Protocols for UC-Secure Circuit Evaluation
               over {\(\mathbb{Z}\)}n},
  booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  pages     = {19--37},
  year      = {2013},
  crossref  = {DBLP:conf/esorics/2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6\_2},
  doi       = {10.1007/978-3-642-40203-6\_2},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/CamenischES13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/CamenischDLNPP13,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Anja Lehmann and
               Gregory Neven and
               Christian Paquin and
               Franz{-}Stefan Preiss},
  title     = {Concepts and Languages for Privacy-Preserving Attribute-Based Authentication},
  booktitle = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6
               Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings},
  pages     = {34--52},
  year      = {2013},
  crossref  = {DBLP:conf/idman/2013},
  url       = {https://doi.org/10.1007/978-3-642-37282-7\_4},
  doi       = {10.1007/978-3-642-37282-7\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/idman/CamenischDLNPP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/Camenisch13,
  author    = {Jan Camenisch},
  title     = {Concepts Around Privacy-Preserving Attribute-Based Credentials - Making
               Authentication with Anonymous Credentials Practical},
  booktitle = {Privacy and Identity Management for Emerging Services and Technologies
               - 8th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer
               School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected
               Papers},
  pages     = {53--63},
  year      = {2013},
  crossref  = {DBLP:conf/primelife/2013},
  url       = {https://doi.org/10.1007/978-3-642-55137-6\_4},
  doi       = {10.1007/978-3-642-55137-6\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/Camenisch13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Camenisch13,
  author    = {Jan Camenisch},
  title     = {Research Challenges to Secure the Future Internet},
  booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
               Italy, August 30, 2013, Proceedings},
  pages     = {14--17},
  year      = {2013},
  crossref  = {DBLP:conf/sdmw/2013},
  url       = {https://doi.org/10.1007/978-3-319-06811-4\_3},
  doi       = {10.1007/978-3-319-06811-4\_3},
  timestamp = {Tue, 23 May 2017 01:13:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sdmw/Camenisch13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CamenischKNP13,
  author    = {Jan Camenisch and
               G{\"{u}}nter Karjoth and
               Gregory Neven and
               Franz{-}Stefan Preiss},
  title     = {Anonymously sharing Flickr pictures with facebook friends},
  booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages     = {13--24},
  year      = {2013},
  crossref  = {DBLP:conf/wpes/2013},
  url       = {https://doi.org/10.1145/2517840.2517861},
  doi       = {10.1145/2517840.2517861},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/CamenischKNP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischES13,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Victor Shoup},
  title     = {Practical and Employable Protocols for UC-Secure Circuit Evaluation
               over Z\({}_{\mbox{n}}\)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {205},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/205},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischES13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Camenisch12,
  author    = {Jan Camenisch},
  title     = {Information privacy?!},
  journal   = {Computer Networks},
  volume    = {56},
  number    = {18},
  pages     = {3834--3848},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.comnet.2012.10.012},
  doi       = {10.1016/j.comnet.2012.10.012},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/Camenisch12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CamenischLN12,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven},
  title     = {Electronic Identities Need Private Credentials},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {10},
  number    = {1},
  pages     = {80--83},
  year      = {2012},
  url       = {https://doi.org/10.1109/MSP.2012.7},
  doi       = {10.1109/MSP.2012.7},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/CamenischLN12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CamenischHP12,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Michael {\O}stergaard Pedersen},
  title     = {Batch Verification of Short Signatures},
  journal   = {J. Cryptology},
  volume    = {25},
  number    = {4},
  pages     = {723--747},
  year      = {2012},
  url       = {https://doi.org/10.1007/s00145-011-9108-z},
  doi       = {10.1007/s00145-011-9108-z},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/CamenischHP12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CamenischG12,
  author    = {Jan Camenisch and
               Thomas Gro{\ss}},
  title     = {Efficient Attributes for Anonymous Credentials},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {15},
  number    = {1},
  pages     = {4:1--4:30},
  year      = {2012},
  url       = {https://doi.org/10.1145/2133375.2133379},
  doi       = {10.1145/2133375.2133379},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/CamenischG12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischLN12,
  author    = {Jan Camenisch and
               Anna Lysyanskaya and
               Gregory Neven},
  title     = {Practical yet universally composable two-server password-authenticated
               secret sharing},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {525--536},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382252},
  doi       = {10.1145/2382196.2382252},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CamenischLN12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/BichselCDLNS12,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Bart De Decker and
               Jorn Lapon and
               Vincent Naessens and
               Dieter Sommer},
  title     = {Data-Minimizing Authentication Goes Mobile},
  booktitle = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11
               International Conference, {CMS} 2012, Canterbury, UK, September 3-5,
               2012. Proceedings},
  pages     = {55--71},
  year      = {2012},
  crossref  = {DBLP:conf/cms/2012},
  url       = {https://doi.org/10.1007/978-3-642-32805-3\_5},
  doi       = {10.1007/978-3-642-32805-3\_5},
  timestamp = {Sat, 24 Nov 2018 11:59:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cms/BichselCDLNS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BichselCS12,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Dieter Sommer},
  title     = {A calculus for privacy-friendly authentication},
  booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages     = {157--166},
  year      = {2012},
  crossref  = {DBLP:conf/sacmat/2012},
  url       = {https://doi.org/10.1145/2295136.2295166},
  doi       = {10.1145/2295136.2295166},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/BichselCS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischNR12,
  author    = {Jan Camenisch and
               Gregory Neven and
               Markus R{\"{u}}ckert},
  title     = {Fully Anonymous Attribute Tokens from Lattices},
  booktitle = {Security and Cryptography for Networks - 8th International Conference,
               {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  pages     = {57--75},
  year      = {2012},
  crossref  = {DBLP:conf/scn/2012},
  url       = {https://doi.org/10.1007/978-3-642-32928-9\_4},
  doi       = {10.1007/978-3-642-32928-9\_4},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischNR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischDH12,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Kristiyan Haralambiev},
  title     = {Efficient Structure-Preserving Signature Scheme from Standard Assumptions},
  booktitle = {Security and Cryptography for Networks - 8th International Conference,
               {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  pages     = {76--94},
  year      = {2012},
  crossref  = {DBLP:conf/scn/2012},
  url       = {https://doi.org/10.1007/978-3-642-32928-9\_5},
  doi       = {10.1007/978-3-642-32928-9\_5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischDH12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischDEN12,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Gregory Neven},
  title     = {Oblivious Transfer with Hidden Access Control from Attribute-Based
               Encryption},
  booktitle = {Security and Cryptography for Networks - 8th International Conference,
               {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  pages     = {559--579},
  year      = {2012},
  crossref  = {DBLP:conf/scn/2012},
  url       = {https://doi.org/10.1007/978-3-642-32928-9\_31},
  doi       = {10.1007/978-3-642-32928-9\_31},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischDEN12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AhnBCHSW12,
  author    = {Jae Hyun Ahn and
               Dan Boneh and
               Jan Camenisch and
               Susan Hohenberger and
               Abhi Shelat and
               Brent Waters},
  title     = {Computing on Authenticated Data},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {1--20},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9\_1},
  doi       = {10.1007/978-3-642-28914-9\_1},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/AhnBCHSW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-4/2011,
  editor    = {Jan Camenisch and
               Dogan Kesdogan},
  title     = {Open Problems in Network Security - {IFIP} {WG} 11.4 International
               Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7039},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-27585-2},
  doi       = {10.1007/978-3-642-27585-2},
  isbn      = {978-3-642-27584-5},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifip11-4/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2011,
  editor    = {Jan Camenisch and
               Bruno Crispo and
               Simone Fischer{-}H{\"{u}}bner and
               Ronald Leenes and
               Giovanni Russello},
  title     = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7,
               11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September
               5-9, 2011, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {375},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31668-5},
  doi       = {10.1007/978-3-642-31668-5},
  isbn      = {978-3-642-31667-8},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/CamenischMTW12,
  author    = {Jan Camenisch and
               Mark Manulis and
               Gene Tsudik and
               Rebecca N. Wright},
  title     = {Privacy-Oriented Cryptography (Dagstuhl Seminar 12381)},
  journal   = {Dagstuhl Reports},
  volume    = {2},
  number    = {9},
  pages     = {165--183},
  year      = {2012},
  url       = {https://doi.org/10.4230/DagRep.2.9.165},
  doi       = {10.4230/DagRep.2.9.165},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dagstuhl-reports/CamenischMTW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongCCR12,
  author    = {Changyu Dong and
               Liqun Chen and
               Jan Camenisch and
               Giovanni Russello},
  title     = {Fair Private Set Intersection with a Semi-trusted Arbiter},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {252},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/252},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DongCCR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDEN12,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Gregory Neven},
  title     = {Oblivious Transfer with Hidden Access Control from Attribute-Based
               Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {348},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/348},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDEN12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischNR12,
  author    = {Jan Camenisch and
               Gregory Neven and
               Markus R{\"{u}}ckert},
  title     = {Fully Anonymous Attribute Tokens from Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {356},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/356},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischNR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLN12,
  author    = {Jan Camenisch and
               Anna Lysyanskaya and
               Gregory Neven},
  title     = {Practical Yet Universally Composable Two-Server Password-Authenticated
               Secret Sharing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {717},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/717},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischLN12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischHKLN11,
  author    = {Jan Camenisch and
               Kristiyan Haralambiev and
               Markulf Kohlweiss and
               Jorn Lapon and
               Vincent Naessens},
  title     = {Structure Preserving {CCA} Secure Encryption and Applications},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  pages     = {89--106},
  year      = {2011},
  crossref  = {DBLP:conf/asiacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0\_5},
  doi       = {10.1007/978-3-642-25385-0\_5},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/CamenischHKLN11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischKS11,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Victor Shoup},
  title     = {A Framework for Practical Universally Composable Zero-Knowledge Protocols},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  pages     = {449--467},
  year      = {2011},
  crossref  = {DBLP:conf/asiacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0\_24},
  doi       = {10.1007/978-3-642-25385-0\_24},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/CamenischKS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Camenisch11,
  author    = {Jan Camenisch},
  title     = {Cryptographic primitives for building secure and privacy respecting
               protocols},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {361--362},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011},
  url       = {https://doi.org/10.1145/2046707.2046749},
  doi       = {10.1145/2046707.2046749},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Camenisch11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/Camenisch11,
  author    = {Jan Camenisch},
  title     = {Identity management tools for protecting online privacy},
  booktitle = {DIM'11, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Chicago, IL, {USA} - October 21, 2011},
  pages     = {1--2},
  year      = {2011},
  crossref  = {DBLP:conf/dim/2011},
  url       = {https://doi.org/10.1145/2046642.2046644},
  doi       = {10.1145/2046642.2046644},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/Camenisch11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/BichselCP11,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Franz{-}Stefan Preiss},
  title     = {A comprehensive framework enabling data-minimizing authentication},
  booktitle = {DIM'11, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Chicago, IL, {USA} - October 21, 2011},
  pages     = {13--22},
  year      = {2011},
  crossref  = {DBLP:conf/dim/2011},
  url       = {https://doi.org/10.1145/2046642.2046647},
  doi       = {10.1145/2046642.2046647},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/BichselCP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDNZ11,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Gregory Neven and
               Gregory M. Zaverucha},
  title     = {Oblivious Transfer with Hidden Access Control Policies},
  booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
               on Practice and Theory in Public Key Cryptography, Taormina, Italy,
               March 6-9, 2011. Proceedings},
  pages     = {192--209},
  year      = {2011},
  crossref  = {DBLP:conf/pkc/2011},
  url       = {https://doi.org/10.1007/978-3-642-19379-8\_12},
  doi       = {10.1007/978-3-642-19379-8\_12},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/CamenischDNZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/BichselCV11,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Mario Verdicchio},
  title     = {Recognizing Your Digital Friends},
  booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
               2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
               International Conference on Social Computing (SocialCom), Boston,
               MA, USA, 9-11 Oct., 2011},
  pages     = {1310--1313},
  year      = {2011},
  crossref  = {DBLP:conf/socialcom/2011},
  url       = {https://doi.org/10.1109/PASSAT/SocialCom.2011.159},
  doi       = {10.1109/PASSAT/SocialCom.2011.159},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/BichselCV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/PfitzmannBC11,
  author    = {Andreas Pfitzmann and
               Katrin Borcea{-}Pfitzmann and
               Jan Camenisch},
  title     = {PrimeLife},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {5--26},
  year      = {2011},
  crossref  = {DBLP:books/sp/primelife2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_1},
  doi       = {10.1007/978-3-642-20317-6\_1},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/primelife11/PfitzmannBC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/CamenischSLPKK11,
  author    = {Jan Camenisch and
               Sandra Steinbrecher and
               Ronald Leenes and
               Stefanie P{\"{o}}tzsch and
               Benjamin Kellermann and
               Laura Klaming},
  title     = {Trustworthiness of Online Content},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {61--85},
  year      = {2011},
  crossref  = {DBLP:books/sp/primelife2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_3},
  doi       = {10.1007/978-3-642-20317-6\_3},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/primelife11/CamenischSLPKK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/CamenischDKLN11,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Markulf Kohlweiss and
               Jorn Lapon and
               Gregory Neven},
  title     = {Cryptographic Mechanisms for Privacy},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {117--134},
  year      = {2011},
  crossref  = {DBLP:books/sp/primelife2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_5},
  doi       = {10.1007/978-3-642-20317-6\_5},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/primelife11/CamenischDKLN11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/CamenischKKPPPRSW11,
  author    = {Jan Camenisch and
               Benjamin Kellermann and
               Stefan K{\"{o}}psell and
               Stefano Paraboschi and
               Franz{-}Stefan Preiss and
               Stefanie P{\"{o}}tzsch and
               Dave Raggett and
               Pierangela Samarati and
               Karel Wouters},
  title     = {Open Source Contributions},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {459--477},
  year      = {2011},
  crossref  = {DBLP:books/sp/primelife2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_24},
  doi       = {10.1007/978-3-642-20317-6\_24},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/primelife11/CamenischKKPPPRSW11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/CamenischH11,
  author    = {Jan Camenisch and
               Marit Hansen},
  title     = {PrimeLife's Legacy},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {505--506},
  year      = {2011},
  crossref  = {DBLP:books/sp/primelife2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_27},
  doi       = {10.1007/978-3-642-20317-6\_27},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/primelife11/CamenischH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/CamenischLHS11,
  author    = {Jan Camenisch and
               Ronald Leenes and
               Marit Hansen and
               Jan Schallab{\"{o}}ck},
  title     = {An Introduction to Privacy-Enhancing Identity Management},
  booktitle = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  pages     = {3--21},
  year      = {2011},
  crossref  = {DBLP:series/lncs/6545},
  url       = {https://doi.org/10.1007/978-3-642-19050-6\_1},
  doi       = {10.1007/978-3-642-19050-6\_1},
  timestamp = {Tue, 16 May 2017 14:24:27 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/CamenischLHS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/CamenischKS11,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Dieter Sommer},
  title     = {Pseudonyms and Private Credentials},
  booktitle = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  pages     = {289--308},
  year      = {2011},
  crossref  = {DBLP:series/lncs/6545},
  url       = {https://doi.org/10.1007/978-3-642-19050-6\_10},
  doi       = {10.1007/978-3-642-19050-6\_10},
  timestamp = {Tue, 16 May 2017 14:24:27 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/CamenischKS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/KalamMBCCDKPPR11,
  author    = {Anas Abou El Kalam and
               Carlos Aguilar Melchor and
               Stefan Berthold and
               Jan Camenisch and
               Sebastian Clau{\ss} and
               Yves Deswarte and
               Markulf Kohlweiss and
               Andriy Panchenko and
               Lexi Pimenidis and
               Matthieu Roy},
  title     = {Further Privacy Mechanisms},
  booktitle = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  pages     = {485--555},
  year      = {2011},
  crossref  = {DBLP:series/lncs/6545},
  url       = {https://doi.org/10.1007/978-3-642-19050-6\_18},
  doi       = {10.1007/978-3-642-19050-6\_18},
  timestamp = {Tue, 16 May 2017 14:24:27 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/KalamMBCCDKPPR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/CamenischP11,
  author    = {Jan Camenisch and
               Andreas Pfitzmann},
  title     = {Conclusion and Outlook},
  booktitle = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  pages     = {759--764},
  year      = {2011},
  crossref  = {DBLP:series/lncs/6545},
  url       = {https://doi.org/10.1007/978-3-642-19050-6\_29},
  doi       = {10.1007/978-3-642-19050-6\_29},
  timestamp = {Tue, 16 May 2017 14:24:27 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/CamenischP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/primelife2011,
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg},
  title     = {Privacy and Identity Management for Life},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6},
  doi       = {10.1007/978-3-642-20317-6},
  isbn      = {978-3-642-20316-9},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/primelife2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2010,
  editor    = {Jan Camenisch and
               Costas Lambrinoudakis},
  title     = {Public Key Infrastructures, Services and Applications - 7th European
               Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6711},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22633-5},
  doi       = {10.1007/978-3-642-22633-5},
  isbn      = {978-3-642-22632-8},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-4/2010,
  editor    = {Jan Camenisch and
               Valentin S. Kisimov and
               Maria Dubovitskaya},
  title     = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International
               Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6555},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19228-9},
  doi       = {10.1007/978-3-642-19228-9},
  isbn      = {978-3-642-19227-2},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifip11-4/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2011,
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Yuko Murayama and
               Armand Portmann and
               Carlos Rieder},
  title     = {Future Challenges in Security and Privacy for Academia and Industry
               - 26th {IFIP} {TC} 11 International Information Security Conference,
               {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {354},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21424-0},
  doi       = {10.1007/978-3-642-21424-0},
  isbn      = {978-3-642-21423-3},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/6545,
  editor    = {Jan Camenisch and
               Ronald Leenes and
               Dieter Sommer},
  title     = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  series    = {Lecture Notes in Computer Science},
  volume    = {6545},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19050-6},
  doi       = {10.1007/978-3-642-19050-6},
  isbn      = {978-3-642-19049-0},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/6545},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhnBCHSW11,
  author    = {Jae Hyun Ahn and
               Dan Boneh and
               Jan Camenisch and
               Susan Hohenberger and
               Abhi Shelat and
               Brent Waters},
  title     = {Computing on Authenticated Data},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {96},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/096},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AhnBCHSW11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKS11,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Victor Shoup},
  title     = {A Framework for Practical Universally Composable Zero-Knowledge Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {228},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/228},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischKS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHKLN11,
  author    = {Jan Camenisch and
               Kristiyan Haralambiev and
               Markulf Kohlweiss and
               Jorn Lapon and
               Vincent Naessens},
  title     = {Structure Preserving {CCA} Secure Encryption and Its Application to
               Oblivious Third Parties},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {319},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/319},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischHKLN11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CachinC10,
  author    = {Christian Cachin and
               Jan Camenisch},
  title     = {Encrypting Keys Securely},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {8},
  number    = {4},
  pages     = {66--69},
  year      = {2010},
  url       = {https://doi.org/10.1109/MSP.2010.124},
  doi       = {10.1109/MSP.2010.124},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/CachinC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CamenischLMCS10,
  author    = {Jan Camenisch and
               Javier L{\'{o}}pez and
               Fabio Massacci and
               Massimo Ciscato and
               Thomas Skordas},
  title     = {{JCS} special issue on EU-funded {ICT} research on Trust and Security},
  journal   = {Journal of Computer Security},
  volume    = {18},
  number    = {1},
  pages     = {1--5},
  year      = {2010},
  url       = {https://doi.org/10.3233/JCS-2010-0375},
  doi       = {10.3233/JCS-2010-0375},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/CamenischLMCS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArdagnaCKLNPSSV10,
  author    = {Claudio Agostino Ardagna and
               Jan Camenisch and
               Markulf Kohlweiss and
               Ronald Leenes and
               Gregory Neven and
               Bart Priem and
               Pierangela Samarati and
               Dieter Sommer and
               Mario Verdicchio},
  title     = {Exploiting cryptography for privacy-enhanced access control: {A} result
               of the {PRIME} Project},
  journal   = {Journal of Computer Security},
  volume    = {18},
  number    = {1},
  pages     = {123--160},
  year      = {2010},
  url       = {https://doi.org/10.3233/JCS-2010-0367},
  doi       = {10.3233/JCS-2010-0367},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/ArdagnaCKLNPSSV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischCGS10,
  author    = {Jan Camenisch and
               Nathalie Casati and
               Thomas Gro{\ss} and
               Victor Shoup},
  title     = {Credential Authenticated Identification and Key Exchange},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  pages     = {255--276},
  year      = {2010},
  crossref  = {DBLP:conf/crypto/2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7\_14},
  doi       = {10.1007/978-3-642-14623-7\_14},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischCGS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CamenischDN10,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Gregory Neven},
  title     = {Unlinkable Priced Oblivious Transfer with Rechargeable Wallets},
  booktitle = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
               Selected Papers},
  pages     = {66--81},
  year      = {2010},
  crossref  = {DBLP:conf/fc/2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3\_8},
  doi       = {10.1007/978-3-642-14577-3\_8},
  timestamp = {Tue, 19 Jun 2018 19:32:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/CamenischDN10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmics/CamenischMS10,
  author    = {Jan Camenisch and
               Sebastian M{\"{o}}dersheim and
               Dieter Sommer},
  title     = {A Formal Model of Identity Mixer},
  booktitle = {Formal Methods for Industrial Critical Systems - 15th International
               Workshop, {FMICS} 2010, Antwerp, Belgium, September 20-21, 2010. Proceedings},
  pages     = {198--214},
  year      = {2010},
  crossref  = {DBLP:conf/fmics/2010},
  url       = {https://doi.org/10.1007/978-3-642-15898-8\_13},
  doi       = {10.1007/978-3-642-15898-8\_13},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fmics/CamenischMS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/BichselC10,
  author    = {Patrik Bichsel and
               Jan Camenisch},
  title     = {Mixing Identities with Ease},
  booktitle = {Policies and Research in Identity Management - Second {IFIP} {WG}
               11.6 Working Conference, {IDMAN} 2010, Oslo, Norway, November 18-19,
               2010. Proceedings},
  pages     = {1--17},
  year      = {2010},
  crossref  = {DBLP:conf/idman/2010},
  url       = {https://doi.org/10.1007/978-3-642-17303-5\_1},
  doi       = {10.1007/978-3-642-17303-5\_1},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/idman/BichselC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/CamenischGHH10,
  author    = {Jan Camenisch and
               Thomas Gro{\ss} and
               Peter Hladky and
               Christian Hoertnagl},
  title     = {Privacy-Friendly Incentives and Their Application to Wikipedia},
  booktitle = {Policies and Research in Identity Management - Second {IFIP} {WG}
               11.6 Working Conference, {IDMAN} 2010, Oslo, Norway, November 18-19,
               2010. Proceedings},
  pages     = {113--129},
  year      = {2010},
  crossref  = {DBLP:conf/idman/2010},
  url       = {https://doi.org/10.1007/978-3-642-17303-5\_9},
  doi       = {10.1007/978-3-642-17303-5\_9},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/idman/CamenischGHH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CamenischMNPS10,
  author    = {Jan Camenisch and
               Sebastian M{\"{o}}dersheim and
               Gregory Neven and
               Franz{-}Stefan Preiss and
               Dieter Sommer},
  title     = {A card requirements language enabling privacy-preserving access control},
  booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages     = {119--128},
  year      = {2010},
  crossref  = {DBLP:conf/sacmat/2010},
  url       = {https://doi.org/10.1145/1809842.1809863},
  doi       = {10.1145/1809842.1809863},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CamenischMNPS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BichselCNSW10,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Gregory Neven and
               Nigel P. Smart and
               Bogdan Warinschi},
  title     = {Get Shorty via Group Signatures without Encryption},
  booktitle = {Security and Cryptography for Networks, 7th International Conference,
               {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  pages     = {381--398},
  year      = {2010},
  crossref  = {DBLP:conf/scn/2010},
  url       = {https://doi.org/10.1007/978-3-642-15317-4\_24},
  doi       = {10.1007/978-3-642-15317-4\_24},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/BichselCNSW10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischKS10,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Claudio Soriente},
  title     = {Solving Revocation with Efficient Update of Anonymous Credentials},
  booktitle = {Security and Cryptography for Networks, 7th International Conference,
               {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  pages     = {454--471},
  year      = {2010},
  crossref  = {DBLP:conf/scn/2010},
  url       = {https://doi.org/10.1007/978-3-642-15317-4\_28},
  doi       = {10.1007/978-3-642-15317-4\_28},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischKS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Camenisch10,
  author    = {Jan Camenisch},
  title     = {Privacy-Enhancing Cryptography: From Theory into Practice},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {498},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2\_29},
  doi       = {10.1007/978-3-642-11799-2\_29},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/Camenisch10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BangerterCK10,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Stephan Krenn},
  title     = {Efficiency Limitations for {\(\Sigma\)}-Protocols for Group Homomorphisms},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {553--571},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2\_33},
  doi       = {10.1007/978-3-642-11799-2\_33},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/BangerterCK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCGS10,
  author    = {Jan Camenisch and
               Nathalie Casati and
               Thomas Gro{\ss} and
               Victor Shoup},
  title     = {Credential Authenticated Identification and Key Exchange},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {55},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/055},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischCGS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischGHH10,
  author    = {Jan Camenisch and
               Thomas Gro{\ss} and
               Peter Hladky and
               Christian Hoertnagl},
  title     = {Privacy-friendly Incentives and their Application to Wikipedia (Extended
               Version)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {401},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/401},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischGHH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischG10,
  author    = {Jan Camenisch and
               Thomas Gro{\ss}},
  title     = {Efficient Attributes for Anonymous Credentials (Extended Version)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {496},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/496},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischG10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AtenieseCJT09,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Marc Joye and
               Gene Tsudik},
  title     = {Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt
               2006},
  journal   = {{IJACT}},
  volume    = {1},
  number    = {4},
  pages     = {320--322},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJACT.2009.028030},
  doi       = {10.1504/IJACT.2009.028030},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijact/AtenieseCJT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischDN09,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Gregory Neven},
  title     = {Oblivious transfer with access control},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {131--140},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009},
  url       = {https://doi.org/10.1145/1653662.1653679},
  doi       = {10.1145/1653662.1653679},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CamenischDN09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BichselCGS09,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Thomas Gro{\ss} and
               Victor Shoup},
  title     = {Anonymous credentials on a standard java card},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {600--610},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009},
  url       = {https://doi.org/10.1145/1653662.1653734},
  doi       = {10.1145/1653662.1653734},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BichselCGS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelenkiyCCKLS09,
  author    = {Mira Belenkiy and
               Jan Camenisch and
               Melissa Chase and
               Markulf Kohlweiss and
               Anna Lysyanskaya and
               Hovav Shacham},
  title     = {Randomizable Proofs and Delegatable Anonymous Credentials},
  booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  pages     = {108--125},
  year      = {2009},
  crossref  = {DBLP:conf/crypto/2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8\_7},
  doi       = {10.1007/978-3-642-03356-8\_7},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BelenkiyCCKLS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischCS09,
  author    = {Jan Camenisch and
               Nishanth Chandran and
               Victor Shoup},
  title     = {A Public Key Encryption Scheme Secure against Key Dependent Chosen
               Plaintext and Adaptive Chosen Ciphertext Attacks},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  pages     = {351--368},
  year      = {2009},
  crossref  = {DBLP:conf/eurocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9\_20},
  doi       = {10.1007/978-3-642-01001-9\_20},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischCS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischKY09,
  author    = {Jan Camenisch and
               Aggelos Kiayias and
               Moti Yung},
  title     = {On the Portability of Generalized Schnorr Proofs},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  pages     = {425--442},
  year      = {2009},
  crossref  = {DBLP:conf/eurocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9\_25},
  doi       = {10.1007/978-3-642-01001-9\_25},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischKY09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CamenischZ09,
  author    = {Jan Camenisch and
               Gregory M. Zaverucha},
  title     = {Private Intersection of Certified Sets},
  booktitle = {Financial Cryptography and Data Security, 13th International Conference,
               {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
               Papers},
  pages     = {108--127},
  year      = {2009},
  crossref  = {DBLP:conf/fc/2009},
  url       = {https://doi.org/10.1007/978-3-642-03549-4\_7},
  doi       = {10.1007/978-3-642-03549-4\_7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/CamenischZ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischKRS09,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Alfredo Rial and
               Caroline Sheedy},
  title     = {Blind and Anonymous Identity-Based Encryption and Authorised Private
               Searches on Public Key Encrypted Data},
  booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  pages     = {196--214},
  year      = {2009},
  crossref  = {DBLP:conf/pkc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1\_12},
  doi       = {10.1007/978-3-642-00468-1\_12},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/CamenischKRS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischKS09,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Claudio Soriente},
  title     = {An Accumulator Based on Bilinear Maps and Efficient Revocation for
               Anonymous Credentials},
  booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  pages     = {481--500},
  year      = {2009},
  crossref  = {DBLP:conf/pkc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1\_27},
  doi       = {10.1007/978-3-642-00468-1\_27},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/CamenischKS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/CamenischN09,
  author    = {Jan Camenisch and
               Gregory Neven},
  title     = {Saving On-Line Privacy},
  booktitle = {Privacy and Identity Management for Life - 5th {IFIP} {WG} 9.2, 9.6/11.4,
               11.6, 11.7/PrimeLife International Summer School, Nice, France, September
               7-11, 2009, Revised Selected Papers},
  pages     = {34--47},
  year      = {2009},
  crossref  = {DBLP:conf/primelife/2009},
  url       = {https://doi.org/10.1007/978-3-642-14282-6\_3},
  doi       = {10.1007/978-3-642-14282-6\_3},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/CamenischN09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-4/2009,
  editor    = {Jan Camenisch and
               Dogan Kesdogan},
  title     = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP}
               {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24,
               2009, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {309},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-05437-2},
  doi       = {10.1007/978-3-642-05437-2},
  isbn      = {978-3-642-05436-5},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifip11-4/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKY09,
  author    = {Jan Camenisch and
               Aggelos Kiayias and
               Moti Yung},
  title     = {On the Portability of Generalized Schnorr Proofs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {50},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/050},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischKY09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDN09,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Gregory Neven},
  title     = {Oblivious Transfer with Access Control},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {529},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/529},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischDN09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BangerterCK09,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Stephan Krenn},
  title     = {Efficiency Limitations for Sigma-Protocols for Group Homomorphisms},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {595},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/595},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BangerterCK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischCS08,
  author    = {Jan Camenisch and
               Rafik Chaabouni and
               Abhi Shelat},
  title     = {Efficient Protocols for Set Membership and Range Proofs},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  pages     = {234--252},
  year      = {2008},
  crossref  = {DBLP:conf/asiacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7\_15},
  doi       = {10.1007/978-3-540-89255-7\_15},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/CamenischCS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischG08,
  author    = {Jan Camenisch and
               Thomas Gro{\ss}},
  title     = {Efficient attributes for anonymous credentials},
  booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages     = {345--356},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008},
  url       = {https://doi.org/10.1145/1455770.1455814},
  doi       = {10.1145/1455770.1455814},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CamenischG08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/CamenischGH08,
  author    = {Jan Camenisch and
               Thomas Gro{\ss} and
               Thomas S. Heydt{-}Benjamin},
  title     = {Rethinking accountable privacy supporting services: extended abstract},
  booktitle = {Proceedings of the 4th Workshop on Digital Identity Management, Alexandria,
               VA, USA, October 31, 2008},
  pages     = {1--8},
  year      = {2008},
  crossref  = {DBLP:conf/dim/2008},
  url       = {https://doi.org/10.1145/1456424.1456426},
  doi       = {10.1145/1456424.1456426},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/CamenischGH08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischNS08,
  author    = {Jan Camenisch and
               Gregory Neven and
               Abhi Shelat},
  title     = {Simulatable Adaptive Oblivious Transfer},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {14},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/014},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischNS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCS08,
  author    = {Jan Camenisch and
               Nishanth Chandran and
               Victor Shoup},
  title     = {A public key encryption scheme secure against key dependent chosen
               plaintext and adaptive chosen ciphertext attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {375},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/375},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischCS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelenkiyCCKLS08,
  author    = {Mira Belenkiy and
               Jan Camenisch and
               Melissa Chase and
               Markulf Kohlweiss and
               Anna Lysyanskaya and
               Hovav Shacham},
  title     = {Delegatable Anonymous Credentials},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {428},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/428},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BelenkiyCCKLS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BangerterCKS008,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Stephan Krenn and
               Ahmad{-}Reza Sadeghi and
               Thomas Schneider},
  title     = {Automatic Generation of Sound Zero-Knowledge Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {471},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/471},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BangerterCKS008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKS08,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Claudio Soriente},
  title     = {An Accumulator Based on Bilinear Maps and Efficient Revocation for
               Anonymous Credentials},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {539},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/539},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischKS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Bhargav-SpantzelCGS07,
  author    = {Abhilasha Bhargav{-}Spantzel and
               Jan Camenisch and
               Thomas Gro{\ss} and
               Dieter Sommer},
  title     = {User centricity: {A} taxonomy and open issues},
  journal   = {Journal of Computer Security},
  volume    = {15},
  number    = {5},
  pages     = {493--527},
  year      = {2007},
  url       = {http://content.iospress.com/articles/journal-of-computer-security/jcs291},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/Bhargav-SpantzelCGS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischHP07,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Michael {\O}stergaard Pedersen},
  title     = {Batch Verification of Short Signatures},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  pages     = {246--263},
  year      = {2007},
  crossref  = {DBLP:conf/eurocrypt/2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4\_14},
  doi       = {10.1007/978-3-540-72540-4\_14},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischHP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischNS07,
  author    = {Jan Camenisch and
               Gregory Neven and
               Abhi Shelat},
  title     = {Simulatable Adaptive Oblivious Transfer},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  pages     = {573--590},
  year      = {2007},
  crossref  = {DBLP:conf/eurocrypt/2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4\_33},
  doi       = {10.1007/978-3-540-72540-4\_33},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischNS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CamenischLM07,
  author    = {Jan Camenisch and
               Anna Lysyanskaya and
               Mira Meyerovich},
  title     = {Endorsed E-Cash},
  booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
               May 2007, Oakland, California, {USA}},
  pages     = {101--115},
  year      = {2007},
  crossref  = {DBLP:conf/sp/2007},
  url       = {https://doi.org/10.1109/SP.2007.15},
  doi       = {10.1109/SP.2007.15},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/CamenischLM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/07/CamenischP07,
  author    = {Jan Camenisch and
               Birgit Pfitzmann},
  title     = {Federated Identity Management},
  booktitle = {Security, Privacy, and Trust in Modern Data Management},
  pages     = {213--238},
  year      = {2007},
  crossref  = {DBLP:books/sp/PJ2007},
  url       = {https://doi.org/10.1007/978-3-540-69861-6\_15},
  doi       = {10.1007/978-3-540-69861-6\_15},
  timestamp = {Tue, 16 May 2017 14:01:42 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/07/CamenischP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2006,
  editor    = {Jan Camenisch and
               Christian S. Collberg and
               Neil F. Johnson and
               Phil Sallee},
  title     = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria,
               VA, USA, July 10-12, 2006. Revised Selcted Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4437},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74124-4},
  doi       = {10.1007/978-3-540-74124-4},
  isbn      = {978-3-540-74123-7},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHP07,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Michael {\O}stergaard Pedersen},
  title     = {Batch Verification of Short Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {172},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/172},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischHP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/CamenischK06,
  author    = {Jan Camenisch and
               Maciej Koprowski},
  title     = {Fine-grained forward-secure signature schemes without random oracles},
  journal   = {Discrete Applied Mathematics},
  volume    = {154},
  number    = {2},
  pages     = {175--188},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.dam.2005.03.028},
  doi       = {10.1016/j.dam.2005.03.028},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dam/CamenischK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischHKLM06,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Markulf Kohlweiss and
               Anna Lysyanskaya and
               Mira Meyerovich},
  title     = {How to win the clonewars: efficient periodic n-times anonymous authentication},
  booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  pages     = {201--210},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006usa},
  url       = {https://doi.org/10.1145/1180405.1180431},
  doi       = {10.1145/1180405.1180431},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CamenischHKLM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/Bhargav-SpantzelCGS06,
  author    = {Abhilasha Bhargav{-}Spantzel and
               Jan Camenisch and
               Thomas Gro{\ss} and
               Dieter Sommer},
  title     = {User centricity: a taxonomy and open issues},
  booktitle = {Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria,
               VA, USA, November 3, 2006},
  pages     = {1--10},
  year      = {2006},
  crossref  = {DBLP:conf/dim/2006},
  url       = {https://doi.org/10.1145/1179529.1179531},
  doi       = {10.1145/1179529.1179531},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/Bhargav-SpantzelCGS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/CamenischSSZ06,
  author    = {Jan Camenisch and
               Abhi Shelat and
               Dieter Sommer and
               Roger Zimmermann},
  title     = {Securing user inputs for the web},
  booktitle = {Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria,
               VA, USA, November 3, 2006},
  pages     = {33--44},
  year      = {2006},
  crossref  = {DBLP:conf/dim/2006},
  url       = {https://doi.org/10.1145/1179529.1179536},
  doi       = {10.1145/1179529.1179536},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/CamenischSSZ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischHL06,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Anna Lysyanskaya},
  title     = {Balancing Accountability and Privacy Using E-Cash (Extended Abstract)},
  booktitle = {Security and Cryptography for Networks, 5th International Conference,
               {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  pages     = {141--155},
  year      = {2006},
  crossref  = {DBLP:conf/scn/2006},
  url       = {https://doi.org/10.1007/11832072\_10},
  doi       = {10.1007/11832072\_10},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischHL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CamenischSZ06,
  author    = {Jan Camenisch and
               Dieter Sommer and
               Roger Zimmermann},
  title     = {A General Certification Framework with Applications to Privacy-Enhancing
               Certificate Infrastructures},
  booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  pages     = {25--37},
  year      = {2006},
  crossref  = {DBLP:conf/sec/2006},
  url       = {https://doi.org/10.1007/0-387-33406-8\_3},
  doi       = {10.1007/0-387-33406-8\_3},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/CamenischSZ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Camenisch06,
  author    = {Jan Camenisch},
  title     = {Protecting (Anonymous) Credentials with the Trusted Computing Group's
               {TPM} {V1.2}},
  booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  pages     = {135--147},
  year      = {2006},
  crossref  = {DBLP:conf/sec/2006},
  url       = {https://doi.org/10.1007/0-387-33406-8\_12},
  doi       = {10.1007/0-387-33406-8\_12},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/Camenisch06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Camenisch06a,
  author    = {Jan Camenisch},
  title     = {Anonymous Credentials: Opportunities and Challenges},
  booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  pages     = {460},
  year      = {2006},
  crossref  = {DBLP:conf/sec/2006},
  url       = {https://doi.org/10.1007/0-387-33406-8\_42},
  doi       = {10.1007/0-387-33406-8\_42},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/Camenisch06a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CamenischGS06,
  author    = {Jan Camenisch and
               Thomas Gro{\ss} and
               Dieter Sommer},
  title     = {Enhancing privacy of federated identity management protocols: anonymous
               credentials in WS-security},
  booktitle = {Proceedings of the 2006 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2006, Alexandria, VA, USA, October 30, 2006},
  pages     = {67--72},
  year      = {2006},
  crossref  = {DBLP:conf/wpes/2006},
  url       = {https://doi.org/10.1145/1179601.1179613},
  doi       = {10.1145/1179601.1179613},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/CamenischGS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHKLM06,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Markulf Kohlweiss and
               Anna Lysyanskaya and
               Mira Meyerovich},
  title     = {How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {454},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/454},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischHKLM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCJT06,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Marc Joye and
               Gene Tsudik},
  title     = {Remarks on "Analysis of One Popular Group Signature Scheme"
               in Asiacrypt 2006},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {464},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/464},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseCJT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseCM05,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Breno de Medeiros},
  title     = {Untraceable {RFID} tags via insubvertible encryption},
  booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages     = {92--101},
  year      = {2005},
  crossref  = {DBLP:conf/ccs/2005},
  url       = {https://doi.org/10.1145/1102120.1102134},
  doi       = {10.1145/1102120.1102134},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AtenieseCM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischL05,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {A Formal Treatment of Onion Routing},
  booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  pages     = {169--187},
  year      = {2005},
  crossref  = {DBLP:conf/crypto/2005},
  url       = {https://doi.org/10.1007/11535218\_11},
  doi       = {10.1007/11535218\_11},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischL05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/CamenischSSFHKLLT05,
  author    = {Jan Camenisch and
               Abhi Shelat and
               Dieter Sommer and
               Simone Fischer{-}H{\"{u}}bner and
               Marit Hansen and
               Henry Krasemann and
               G{\'{e}}rard Lacoste and
               Ronald Leenes and
               Jimmy C. Tseng},
  title     = {Privacy and identity management for everyone},
  booktitle = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax,
               VA, USA, November 11, 2005},
  pages     = {20--27},
  year      = {2005},
  crossref  = {DBLP:conf/dim/2005},
  url       = {https://doi.org/10.1145/1102486.1102491},
  doi       = {10.1145/1102486.1102491},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/CamenischSSFHKLLT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischHL05,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Anna Lysyanskaya},
  title     = {Compact E-Cash},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Aarhus, Denmark, May 22-26, 2005, Proceedings},
  pages     = {302--321},
  year      = {2005},
  crossref  = {DBLP:conf/eurocrypt/2005},
  url       = {https://doi.org/10.1007/11426639\_18},
  doi       = {10.1007/11426639\_18},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischHL05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/CamenischM05,
  author    = {Jan Camenisch and
               Anton Mityagin},
  title     = {Mix-Network with Stronger Security},
  booktitle = {Privacy Enhancing Technologies, 5th International Workshop, {PET}
               2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers},
  pages     = {128--146},
  year      = {2005},
  crossref  = {DBLP:conf/pet/2005},
  url       = {https://doi.org/10.1007/11767831\_9},
  doi       = {10.1007/11767831\_9},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/CamenischM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BangerterCM05,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Ueli M. Maurer},
  title     = {Efficient Proofs of Knowledge of Discrete Logarithms and Representations
               in Groups with Hidden Order},
  booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
               Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
               January 23-26, 2005, Proceedings},
  pages     = {154--171},
  year      = {2005},
  crossref  = {DBLP:conf/pkc/2005},
  url       = {https://doi.org/10.1007/978-3-540-30580-4\_11},
  doi       = {10.1007/978-3-540-30580-4\_11},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/BangerterCM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BackesCS05,
  author    = {Michael Backes and
               Jan Camenisch and
               Dieter Sommer},
  title     = {Anonymous yet accountable access control},
  booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages     = {40--46},
  year      = {2005},
  crossref  = {DBLP:conf/wpes/2005},
  url       = {https://doi.org/10.1145/1102199.1102208},
  doi       = {10.1145/1102199.1102208},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/BackesCS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHL05,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Anna Lysyanskaya},
  title     = {Compact E-Cash},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {60},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/060},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischHL05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCHM05,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Susan Hohenberger and
               Breno de Medeiros},
  title     = {Practical Group Signatures without Random Oracles},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {385},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/385},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AtenieseCHM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HansenBCCPW04,
  author    = {Marit Hansen and
               Peter Berlich and
               Jan Camenisch and
               Sebastian Clau{\ss} and
               Andreas Pfitzmann and
               Michael Waidner},
  title     = {Privacy-enhancing identity management},
  journal   = {Inf. Sec. Techn. Report},
  volume    = {9},
  number    = {1},
  pages     = {35--44},
  year      = {2004},
  url       = {https://doi.org/10.1016/S1363-4127(04)00014-7},
  doi       = {10.1016/S1363-4127(04)00014-7},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/istr/HansenBCCPW04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrickellCC04,
  author    = {Ernest F. Brickell and
               Jan Camenisch and
               Liqun Chen},
  title     = {Direct anonymous attestation},
  booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages     = {132--145},
  year      = {2004},
  crossref  = {DBLP:conf/ccs/2004ccs},
  url       = {https://doi.org/10.1145/1030083.1030103},
  doi       = {10.1145/1030083.1030103},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BrickellCC04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischL04,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
  booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
               CryptologyConference, Santa Barbara, California, USA, August 15-19,
               2004, Proceedings},
  pages     = {56--72},
  year      = {2004},
  crossref  = {DBLP:conf/crypto/2004},
  url       = {https://doi.org/10.1007/978-3-540-28628-8\_4},
  doi       = {10.1007/978-3-540-28628-8\_4},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Camenisch04,
  author    = {Jan Camenisch},
  title     = {Better Privacy for Trusted Computing Platforms: (Extended Abstract)},
  booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
               Computer Security, Sophia Antipolis, France, September 13-15, 2004,
               Proceedings},
  pages     = {73--88},
  year      = {2004},
  crossref  = {DBLP:conf/esorics/2004},
  url       = {https://doi.org/10.1007/978-3-540-30108-0\_5},
  doi       = {10.1007/978-3-540-30108-0\_5},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/Camenisch04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischG04,
  author    = {Jan Camenisch and
               Jens Groth},
  title     = {Group Signatures: Better Efficiency and New Theoretical Aspects},
  booktitle = {Security in Communication Networks, 4th International Conference,
               {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
               Papers},
  pages     = {120--133},
  year      = {2004},
  crossref  = {DBLP:conf/scn/2004},
  url       = {https://doi.org/10.1007/978-3-540-30598-9\_9},
  doi       = {10.1007/978-3-540-30598-9\_9},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischG04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischKW04,
  author    = {Jan Camenisch and
               Maciej Koprowski and
               Bogdan Warinschi},
  title     = {Efficient Blind Signatures Without Random Oracles},
  booktitle = {Security in Communication Networks, 4th International Conference,
               {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
               Papers},
  pages     = {134--148},
  year      = {2004},
  crossref  = {DBLP:conf/scn/2004},
  url       = {https://doi.org/10.1007/978-3-540-30598-9\_10},
  doi       = {10.1007/978-3-540-30598-9\_10},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischKW04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BangerterCL04,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Anna Lysyanskaya},
  title     = {A Cryptographic Framework for the Controlled Release of Certified
               Data},
  booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April
               26-28, 2004. Revised Selected Papers},
  pages     = {20--42},
  year      = {2004},
  crossref  = {DBLP:conf/spw/2004},
  url       = {https://doi.org/10.1007/11861386\_4},
  doi       = {10.1007/11861386\_4},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/BangerterCL04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2004,
  editor    = {Christian Cachin and
               Jan Camenisch},
  title     = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3027},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b97182},
  doi       = {10.1007/b97182},
  isbn      = {3-540-21935-8},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrickellCC04,
  author    = {Ernie Brickell and
               Jan Camenisch and
               Liqun Chen},
  title     = {Direct Anonymous Attestation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {205},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/205},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrickellCC04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischS03,
  author    = {Jan Camenisch and
               Victor Shoup},
  title     = {Practical Verifiable Encryption and Decryption of Discrete Logarithms},
  booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  pages     = {126--144},
  year      = {2003},
  crossref  = {DBLP:conf/crypto/2003},
  url       = {https://doi.org/10.1007/978-3-540-45146-4\_8},
  doi       = {10.1007/978-3-540-45146-4\_8},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischS03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischH02,
  author    = {Jan Camenisch and
               Els Van Herreweghen},
  title     = {Design and implementation of the \emph{idemix} anonymous credential
               system},
  booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications
               Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages     = {21--30},
  year      = {2002},
  crossref  = {DBLP:conf/ccs/2002},
  url       = {https://doi.org/10.1145/586110.586114},
  doi       = {10.1145/586110.586114},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CamenischH02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischL02,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {Dynamic Accumulators and Application to Efficient Revocation of Anonymous
               Credentials},
  booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  pages     = {61--76},
  year      = {2002},
  crossref  = {DBLP:conf/crypto/2002},
  url       = {https://doi.org/10.1007/3-540-45708-9\_5},
  doi       = {10.1007/3-540-45708-9\_5},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischL02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlgesheimerCS02,
  author    = {Joy Algesheimer and
               Jan Camenisch and
               Victor Shoup},
  title     = {Efficient Computation Modulo a Shared Secret with Application to the
               Generation of Shared Safe-Prime Products},
  booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  pages     = {417--432},
  year      = {2002},
  crossref  = {DBLP:conf/crypto/2002},
  url       = {https://doi.org/10.1007/3-540-45708-9\_27},
  doi       = {10.1007/3-540-45708-9\_27},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/AlgesheimerCS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischL02,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {A Signature Scheme with Efficient Protocols},
  booktitle = {Security in Communication Networks, Third International Conference,
               {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  pages     = {268--289},
  year      = {2002},
  crossref  = {DBLP:conf/scn/2002},
  url       = {https://doi.org/10.1007/3-540-36413-7\_20},
  doi       = {10.1007/3-540-36413-7\_20},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CamenischL02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlgesheimerCS02,
  author    = {Joy Algesheimer and
               Jan Camenisch and
               Victor Shoup},
  title     = {Efficient Computation Modulo a Shared Secret with Application to the
               Generation of Shared Safe-Prime Products},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {29},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/029},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AlgesheimerCS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischS02,
  author    = {Jan Camenisch and
               Victor Shoup},
  title     = {Practical Verifiable Encryption and Decryption of Discrete Logarithms},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {161},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/161},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischL01,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {An Identity Escrow Scheme with Appointed Verifiers},
  booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  pages     = {388--407},
  year      = {2001},
  crossref  = {DBLP:conf/crypto/2001},
  url       = {https://doi.org/10.1007/3-540-44647-8\_23},
  doi       = {10.1007/3-540-44647-8\_23},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischL01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischL01,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {An Efficient System for Non-transferable Anonymous Credentials with
               Optional Anonymity Revocation},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
               on the Theory and Application of Cryptographic Techniques, Innsbruck,
               Austria, May 6-10, 2001, Proceeding},
  pages     = {93--118},
  year      = {2001},
  crossref  = {DBLP:conf/eurocrypt/2001},
  url       = {https://doi.org/10.1007/3-540-44987-6\_7},
  doi       = {10.1007/3-540-44987-6\_7},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischL01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlgesheimerCCK01,
  author    = {Joy Algesheimer and
               Christian Cachin and
               Jan Camenisch and
               G{\"{u}}nter Karjoth},
  title     = {Cryptographic Security for Mobile Code},
  booktitle = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California,
               {USA} May 14-16, 2001},
  pages     = {2--11},
  year      = {2001},
  crossref  = {DBLP:conf/sp/2001},
  url       = {https://doi.org/10.1109/SECPRI.2001.924283},
  doi       = {10.1109/SECPRI.2001.924283},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/AlgesheimerCCK01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischL01,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {An Efficient System for Non-transferable Anonymous Credentials with
               Optional Anonymity Revocation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2001},
  pages     = {19},
  year      = {2001},
  url       = {http://eprint.iacr.org/2001/019},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischL01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischL01a,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {Efficient Revocation of Anonymous Group Membership},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2001},
  pages     = {113},
  year      = {2001},
  url       = {http://eprint.iacr.org/2001/113},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischL01a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischD00,
  author    = {Jan Camenisch and
               Ivan Damg{\aa}rd},
  title     = {Verifiable Encryption, Group Encryption, and Their Applications to
               Separable Group Signatures and Signature Sharing Schemes},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  pages     = {331--345},
  year      = {2000},
  crossref  = {DBLP:conf/asiacrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44448-3\_25},
  doi       = {10.1007/3-540-44448-3\_25},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/CamenischD00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Camenisch00,
  author    = {Jan Camenisch},
  title     = {Efficient Anonymous Fingerprinting with Group Signatures},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  pages     = {415--428},
  year      = {2000},
  crossref  = {DBLP:conf/asiacrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44448-3\_32},
  doi       = {10.1007/3-540-44448-3\_32},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/Camenisch00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CachinC00,
  author    = {Christian Cachin and
               Jan Camenisch},
  title     = {Optimistic Fair Secure Computation},
  booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2000, Proceedings},
  pages     = {93--111},
  year      = {2000},
  crossref  = {DBLP:conf/crypto/2000},
  url       = {https://doi.org/10.1007/3-540-44598-6\_6},
  doi       = {10.1007/3-540-44598-6\_6},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CachinC00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AtenieseCJT00,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Marc Joye and
               Gene Tsudik},
  title     = {A Practical and Provably Secure Coalition-Resistant Group Signature
               Scheme},
  booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2000, Proceedings},
  pages     = {255--270},
  year      = {2000},
  crossref  = {DBLP:conf/crypto/2000},
  url       = {https://doi.org/10.1007/3-540-44598-6\_16},
  doi       = {10.1007/3-540-44598-6\_16},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/AtenieseCJT00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischM00,
  author    = {Jan Camenisch and
               Markus Michels},
  title     = {Confirmer Signature Schemes Secure against Adaptive Adversaries},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  pages     = {243--258},
  year      = {2000},
  crossref  = {DBLP:conf/eurocrypt/2000},
  url       = {https://doi.org/10.1007/3-540-45539-6\_17},
  doi       = {10.1007/3-540-45539-6\_17},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischM00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/CachinCKM00,
  author    = {Christian Cachin and
               Jan Camenisch and
               Joe Kilian and
               Joy M{\"{u}}ller},
  title     = {One-Round Secure Computation and Secure Autonomous Mobile Agents},
  booktitle = {Automata, Languages and Programming, 27th International Colloquium,
               {ICALP} 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings},
  pages     = {512--523},
  year      = {2000},
  crossref  = {DBLP:conf/icalp/2000},
  url       = {https://doi.org/10.1007/3-540-45022-X\_43},
  doi       = {10.1007/3-540-45022-X\_43},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/CachinCKM00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischM99,
  author    = {Jan Camenisch and
               Markus Michels},
  title     = {Separability and Efficiency for Generic Group Signature Schemes},
  booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  pages     = {413--430},
  year      = {1999},
  crossref  = {DBLP:conf/crypto/1999},
  url       = {https://doi.org/10.1007/3-540-48405-1\_27},
  doi       = {10.1007/3-540-48405-1\_27},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischM99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischM99,
  author    = {Jan Camenisch and
               Markus Michels},
  title     = {Proving in Zero-Knowledge that a Number Is the Product of Two Safe
               Primes},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  pages     = {107--122},
  year      = {1999},
  crossref  = {DBLP:conf/eurocrypt/99},
  url       = {https://doi.org/10.1007/3-540-48910-X\_8},
  doi       = {10.1007/3-540-48910-X\_8},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischM99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischD99,
  author    = {Jan Camenisch and
               Ivan Damg{\aa}rd},
  title     = {Verifiable Encryption and Applications to Group Signatures and Signature
               Sharing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {1999},
  pages     = {8},
  year      = {1999},
  url       = {http://eprint.iacr.org/1999/008},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CamenischD99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Camenisch98,
  author    = {Jan Camenisch},
  title     = {Group signature schemes and payment systems based on the discrete
               logarithm problem},
  school    = {{ETH} Zurich, Z{\"{u}}rich, Switzerland},
  year      = {1998},
  url       = {http://d-nb.info/953066045},
  isbn      = {978-3-89649-286-9},
  timestamp = {Fri, 13 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/phd/dnb/Camenisch98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischM98,
  author    = {Jan Camenisch and
               Markus Michels},
  title     = {A Group Signature Scheme with Improved Efficiency},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  pages     = {160--174},
  year      = {1998},
  crossref  = {DBLP:conf/asiacrypt/1998},
  url       = {https://doi.org/10.1007/3-540-49649-1\_14},
  doi       = {10.1007/3-540-49649-1\_14},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/CamenischM98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CamenischMS97,
  author    = {Jan Camenisch and
               Ueli M. Maurer and
               Markus Stadler},
  title     = {Digital Payment Systems With Passive Anonymity-Revoking Trustees},
  journal   = {Journal of Computer Security},
  volume    = {5},
  number    = {1},
  pages     = {69--90},
  year      = {1997},
  url       = {https://doi.org/10.3233/JCS-1997-5104},
  doi       = {10.3233/JCS-1997-5104},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/CamenischMS97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischS97,
  author    = {Jan Camenisch and
               Markus Stadler},
  title     = {Efficient Group Signature Schemes for Large Groups (Extended Abstract)},
  booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  pages     = {410--424},
  year      = {1997},
  crossref  = {DBLP:conf/crypto/1997},
  url       = {https://doi.org/10.1007/BFb0052252},
  doi       = {10.1007/BFb0052252},
  timestamp = {Mon, 22 May 2017 17:11:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/CamenischS97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Camenisch97,
  author    = {Jan Camenisch},
  title     = {Efficient and Generalized Group Signatures},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  pages     = {465--479},
  year      = {1997},
  crossref  = {DBLP:conf/eurocrypt/97},
  url       = {https://doi.org/10.1007/3-540-69053-0\_32},
  doi       = {10.1007/3-540-69053-0\_32},
  timestamp = {Mon, 22 May 2017 17:12:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Camenisch97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischPS96,
  author    = {Jan Camenisch and
               Jean{-}Marc Piveteau and
               Markus Stadler},
  title     = {An Efficient Fair Payment System},
  booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
               Communications Security, New Delhi, India, March 14-16, 1996.},
  pages     = {88--94},
  year      = {1996},
  crossref  = {DBLP:conf/ccs/1996},
  url       = {https://doi.org/10.1145/238168.238193},
  doi       = {10.1145/238168.238193},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CamenischPS96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischMS96,
  author    = {Jan Camenisch and
               Ueli M. Maurer and
               Markus Stadler},
  title     = {Digital Payment Systems with Passive Anonymity-Revoking Trustees},
  booktitle = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
               in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  pages     = {33--43},
  year      = {1996},
  crossref  = {DBLP:conf/esorics/1996},
  url       = {https://doi.org/10.1007/3-540-61770-1\_26},
  doi       = {10.1007/3-540-61770-1\_26},
  timestamp = {Mon, 22 May 2017 16:14:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/CamenischMS96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/StadlerPC95,
  author    = {Markus Stadler and
               Jean{-}Marc Piveteau and
               Jan Camenisch},
  title     = {Fair Blind Signatures},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
               on the Theory and Application of Cryptographic Techniques, Saint-Malo,
               France, May 21-25, 1995, Proceeding},
  pages     = {209--219},
  year      = {1995},
  crossref  = {DBLP:conf/eurocrypt/95},
  url       = {https://doi.org/10.1007/3-540-49264-X\_17},
  doi       = {10.1007/3-540-49264-X\_17},
  timestamp = {Mon, 22 May 2017 12:56:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/StadlerPC95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/CamenischPS95,
  author    = {Jan Camenisch and
               Jean{-}Marc Piveteau and
               Markus Stadler},
  title     = {Faire anonyme Zahlungssysteme},
  booktitle = {{GISI} 95, Herausforderungen eines globalen Informationsverbundes
               f{\"{u}}r die Informatik, 25. GI-Jahrestagung und 13. Schweizer
               Informatikertag, Z{\"{u}}rich, Schweiz, 18.-20. September 1995},
  pages     = {254--265},
  year      = {1995},
  crossref  = {DBLP:conf/gi/1995},
  url       = {https://doi.org/10.1007/978-3-642-79958-7\_33},
  doi       = {10.1007/978-3-642-79958-7\_33},
  timestamp = {Tue, 23 May 2017 01:10:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gi/CamenischPS95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischPS94,
  author    = {Jan Camenisch and
               Jean{-}Marc Piveteau and
               Markus Stadler},
  title     = {An Efficient Electronic Payment System Protecting Privacy},
  booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research
               in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  pages     = {207--215},
  year      = {1994},
  crossref  = {DBLP:conf/esorics/1994},
  url       = {https://doi.org/10.1007/3-540-58618-0\_65},
  doi       = {10.1007/3-540-58618-0\_65},
  timestamp = {Sat, 20 May 2017 15:32:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/CamenischPS94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischPS94,
  author    = {Jan Camenisch and
               Jean{-}Marc Piveteau and
               Markus Stadler},
  title     = {Blind Signatures Based on the Discrete Logarithm Problem},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  pages     = {428--432},
  year      = {1994},
  crossref  = {DBLP:conf/eurocrypt/94},
  url       = {https://doi.org/10.1007/BFb0053458},
  doi       = {10.1007/BFb0053458},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CamenischPS94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2018,
  editor    = {Bart Preneel and
               Frederik Vercauteren},
  title     = {Applied Cryptography and Network Security - 16th International Conference,
               {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10892},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93387-0},
  doi       = {10.1007/978-3-319-93387-0},
  isbn      = {978-3-319-93386-3},
  timestamp = {Wed, 13 Jun 2018 13:59:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-1,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10820},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78381-9},
  doi       = {10.1007/978-3-319-78381-9},
  isbn      = {978-3-319-78380-2},
  timestamp = {Mon, 16 Apr 2018 13:48:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2018,
  editor    = {Liqun Chen and
               Mark Manulis and
               Steve Schneider},
  title     = {Information Security - 21st International Conference, {ISC} 2018,
               Guildford, UK, September 9-12, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11060},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-99136-8},
  doi       = {10.1007/978-3-319-99136-8},
  isbn      = {978-3-319-99135-1},
  timestamp = {Mon, 03 Sep 2018 13:50:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2017-1,
  editor    = {Josef Pieprzyk and
               Suriadi Suriadi},
  title     = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
               2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10342},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-60055-0},
  doi       = {10.1007/978-3-319-60055-0},
  isbn      = {978-3-319-60054-3},
  timestamp = {Wed, 31 May 2017 15:29:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-3,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10403},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63697-9},
  doi       = {10.1007/978-3-319-63697-9},
  isbn      = {978-3-319-63696-2},
  timestamp = {Mon, 14 Aug 2017 14:44:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2017,
  title     = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
               Barbara, CA, USA, August 21-25, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8048777},
  isbn      = {978-1-5386-3217-8},
  timestamp = {Mon, 16 Oct 2017 15:00:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2017,
  title     = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7961955},
  isbn      = {978-1-5090-5762-7},
  timestamp = {Wed, 12 Jul 2017 09:52:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017,
  editor    = {Aggelos Kiayias},
  title     = {Financial Cryptography and Data Security - 21st International Conference,
               {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10322},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70972-7},
  doi       = {10.1007/978-3-319-70972-7},
  isbn      = {978-3-319-70971-0},
  timestamp = {Tue, 02 Jan 2018 13:47:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icete/2017d,
  editor    = {Christian Callegari and
               Mohammad S. Obaidat and
               Enrique Cabello},
  title     = {Proceedings of the 14th International Joint Conference on e-Business
               and Telecommunications {(ICETE} 2017) - Volume 1: DCNET, Madrid, Spain,
               July 24-26, 2017},
  publisher = {SciTePress},
  year      = {2017},
  isbn      = {978-989-758-256-1},
  timestamp = {Wed, 29 Aug 2018 15:13:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icete/2017d},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2017-2,
  editor    = {Serge Fehr},
  title     = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10175},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54388-7},
  doi       = {10.1007/978-3-662-54388-7},
  isbn      = {978-3-662-54387-0},
  timestamp = {Thu, 23 Nov 2017 13:00:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2017,
  title     = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7957740},
  isbn      = {978-1-5090-5533-3},
  timestamp = {Tue, 27 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vnc/2017,
  title     = {2017 {IEEE} Vehicular Networking Conference, {VNC} 2017, Torino, Italy,
               November 27-29, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8267164},
  isbn      = {978-1-5386-0986-6},
  timestamp = {Sun, 04 Feb 2018 13:00:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/vnc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-2,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10032},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53890-6},
  doi       = {10.1007/978-3-662-53890-6},
  isbn      = {978-3-662-53889-0},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-3,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9816},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53015-3},
  doi       = {10.1007/978-3-662-53015-3},
  isbn      = {978-3-662-53014-6},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2016-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2016-2,
  editor    = {Chen{-}Mou Cheng and
               Kai{-}Min Chung and
               Giuseppe Persiano and
               Bo{-}Yin Yang},
  title     = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
               March 6-9, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9615},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49387-8},
  doi       = {10.1007/978-3-662-49387-8},
  isbn      = {978-3-662-49386-1},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2016,
  editor    = {Vassilis Zikas and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks - 10th International Conference,
               {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9841},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-44618-9},
  doi       = {10.1007/978-3-319-44618-9},
  isbn      = {978-3-319-44617-2},
  timestamp = {Fri, 26 May 2017 00:49:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2016,
  editor    = {Michael Franz and
               Panos Papadimitratos},
  title     = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
               2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9824},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45572-3},
  doi       = {10.1007/978-3-319-45572-3},
  isbn      = {978-3-319-45571-6},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Sabrina De Capitani di Vimercati},
  title     = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
               Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2994620},
  doi       = {10.1145/2994620},
  isbn      = {978-1-4503-4569-9},
  timestamp = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2015,
  editor    = {Tal Malkin and
               Vladimir Kolesnikov and
               Allison Bishop Lewko and
               Michalis Polychronakis},
  title     = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9092},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7},
  doi       = {10.1007/978-3-319-28166-7},
  isbn      = {978-3-319-28165-0},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-2,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3},
  doi       = {10.1007/978-3-662-48800-3},
  isbn      = {978-3-662-48799-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Wed, 11 Apr 2018 11:09:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2015,
  editor    = {Jonathan Katz},
  title     = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9020},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2},
  doi       = {10.1007/978-3-662-46447-2},
  isbn      = {978-3-662-46446-5},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2015,
  editor    = {Orr Dunkelman and
               Liam Keliher},
  title     = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
               Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9566},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-31301-6},
  doi       = {10.1007/978-3-319-31301-6},
  isbn      = {978-3-319-31300-9},
  timestamp = {Sun, 21 May 2017 00:19:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2015,
  editor    = {Indrajit Ray and
               Nicholas Hopper and
               Rob Jansen},
  title     = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808138},
  doi       = {10.1145/2808138},
  isbn      = {978-1-4503-3820-2},
  timestamp = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0039026,
  editor    = {Kai Rannenberg and
               Jan Camenisch and
               Ahmad Sabouri},
  title     = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-14439-9},
  doi       = {10.1007/978-3-319-14439-9},
  isbn      = {978-3-319-14438-2},
  timestamp = {Tue, 16 May 2017 14:01:41 +0200},
  biburl    = {https://dblp.org/rec/bib/books/daglib/0039026},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014-1,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8873},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45611-8},
  doi       = {10.1007/978-3-662-45611-8},
  isbn      = {978-3-662-45610-1},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2014-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-2,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8617},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44381-1},
  doi       = {10.1007/978-3-662-44381-1},
  isbn      = {978-3-662-44380-4},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2014-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-2,
  editor    = {Miroslaw Kutylowski and
               Jaideep Vaidya},
  title     = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8713},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11212-1},
  doi       = {10.1007/978-3-319-11212-1},
  isbn      = {978-3-319-11211-4},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2014-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2014,
  editor    = {Yehuda Lindell},
  title     = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8349},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8},
  doi       = {10.1007/978-3-642-54242-8},
  isbn      = {978-3-642-54241-1},
  timestamp = {Fri, 02 Nov 2018 09:44:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2014,
  editor    = {Thorsten Holz and
               Sotiris Ioannidis},
  title     = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
               2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8564},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-08593-7},
  doi       = {10.1007/978-3-319-08593-7},
  isbn      = {978-3-319-08592-0},
  timestamp = {Wed, 14 Nov 2018 10:59:33 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2013,
  editor    = {Lingyu Wang and
               Basit Shafiq},
  title     = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7964},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39256-6},
  doi       = {10.1007/978-3-642-39256-6},
  isbn      = {978-3-642-39255-9},
  timestamp = {Fri, 26 May 2017 00:49:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2013,
  editor    = {Thomas Gro{\ss} and
               Marit Hansen},
  title     = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Berlin, Germany, November 8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517881},
  isbn      = {978-1-4503-2493-9},
  timestamp = {Mon, 09 Dec 2013 15:49:10 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2013,
  editor    = {Jason Crampton and
               Sushil Jajodia and
               Keith Mayes},
  title     = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8134},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6},
  doi       = {10.1007/978-3-642-40203-6},
  isbn      = {978-3-642-40202-9},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/idman/2013,
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Elisabeth de Leeuw and
               Chris J. Mitchell},
  title     = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6
               Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {396},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-37282-7},
  doi       = {10.1007/978-3-642-37282-7},
  isbn      = {978-3-642-37281-0},
  timestamp = {Sun, 04 Jun 2017 10:05:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/idman/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2013,
  editor    = {Marit Hansen and
               Jaap{-}Henk Hoepman and
               Ronald E. Leenes and
               Diane Whitehouse},
  title     = {Privacy and Identity Management for Emerging Services and Technologies
               - 8th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer
               School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected
               Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {421},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-55137-6},
  doi       = {10.1007/978-3-642-55137-6},
  isbn      = {978-3-642-55136-9},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2013,
  editor    = {Willem Jonker and
               Milan Petkovic},
  title     = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
               Italy, August 30, 2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8425},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-06811-4},
  doi       = {10.1007/978-3-319-06811-4},
  isbn      = {978-3-319-06810-7},
  timestamp = {Tue, 23 May 2017 01:13:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sdmw/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Sara Foresti},
  title     = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517840},
  isbn      = {978-1-4503-2485-4},
  timestamp = {Fri, 22 Nov 2013 19:47:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2012,
  editor    = {Bart De Decker and
               David W. Chadwick},
  title     = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11
               International Conference, {CMS} 2012, Canterbury, UK, September 3-5,
               2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7394},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32805-3},
  doi       = {10.1007/978-3-642-32805-3},
  isbn      = {978-3-642-32804-6},
  timestamp = {Sat, 24 Nov 2018 11:59:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cms/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2012,
  editor    = {Vijay Atluri and
               Jaideep Vaidya and
               Axel Kern and
               Murat Kantarcioglu},
  title     = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2295136},
  doi       = {10.1145/2295136},
  isbn      = {978-1-4503-1295-0},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2012,
  editor    = {Ivan Visconti and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks - 8th International Conference,
               {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7485},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32928-9},
  doi       = {10.1007/978-3-642-32928-9},
  isbn      = {978-3-642-32927-2},
  timestamp = {Fri, 26 May 2017 00:49:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2012,
  editor    = {Ronald Cramer},
  title     = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7194},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9},
  doi       = {10.1007/978-3-642-28914-9},
  isbn      = {978-3-642-28913-2},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2011,
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0},
  doi       = {10.1007/978-3-642-25385-0},
  isbn      = {978-3-642-25384-3},
  timestamp = {Wed, 10 Jan 2018 08:32:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011,
  editor    = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0948-6},
  timestamp = {Thu, 20 Oct 2011 19:38:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2011,
  editor    = {Abhilasha Bhargav{-}Spantzel and
               Thomas Gro{\ss}},
  title     = {DIM'11, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Chicago, IL, {USA} - October 21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2046642},
  isbn      = {978-1-4503-1006-2},
  timestamp = {Mon, 09 Dec 2013 15:50:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2011,
  editor    = {Dario Catalano and
               Nelly Fazio and
               Rosario Gennaro and
               Antonio Nicolosi},
  title     = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
               on Practice and Theory in Public Key Cryptography, Taormina, Italy,
               March 6-9, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6571},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19379-8},
  doi       = {10.1007/978-3-642-19379-8},
  isbn      = {978-3-642-19378-1},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/socialcom/2011,
  title     = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
               2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
               International Conference on Social Computing (SocialCom), Boston,
               MA, USA, 9-11 Oct., 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6112285},
  isbn      = {978-1-4577-1931-8},
  timestamp = {Sun, 05 May 2013 11:53:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/primelife2011,
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg},
  title     = {Privacy and Identity Management for Life},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6},
  doi       = {10.1007/978-3-642-20317-6},
  isbn      = {978-3-642-20316-9},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/primelife2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/6545,
  editor    = {Jan Camenisch and
               Ronald Leenes and
               Dieter Sommer},
  title     = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  series    = {Lecture Notes in Computer Science},
  volume    = {6545},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19050-6},
  doi       = {10.1007/978-3-642-19050-6},
  isbn      = {978-3-642-19049-0},
  timestamp = {Tue, 16 May 2017 14:24:27 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/6545},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor    = {Tal Rabin},
  title     = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7},
  doi       = {10.1007/978-3-642-14623-7},
  isbn      = {978-3-642-14622-0},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2010,
  editor    = {Radu Sion},
  title     = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6052},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3},
  doi       = {10.1007/978-3-642-14577-3},
  isbn      = {978-3-642-14576-6},
  timestamp = {Tue, 19 Jun 2018 19:32:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fmics/2010,
  editor    = {Stefan Kowalewski and
               Marco Roveri},
  title     = {Formal Methods for Industrial Critical Systems - 15th International
               Workshop, {FMICS} 2010, Antwerp, Belgium, September 20-21, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6371},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15898-8},
  doi       = {10.1007/978-3-642-15898-8},
  isbn      = {978-3-642-15897-1},
  timestamp = {Sun, 21 May 2017 00:22:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fmics/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/idman/2010,
  editor    = {Elisabeth de Leeuw and
               Simone Fischer{-}H{\"{u}}bner and
               Lothar Fritsch},
  title     = {Policies and Research in Identity Management - Second {IFIP} {WG}
               11.6 Working Conference, {IDMAN} 2010, Oslo, Norway, November 18-19,
               2010. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {343},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17303-5},
  doi       = {10.1007/978-3-642-17303-5},
  isbn      = {978-3-642-17302-8},
  timestamp = {Wed, 24 May 2017 08:28:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/idman/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2010,
  editor    = {James B. D. Joshi and
               Barbara Carminati},
  title     = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1809842},
  doi       = {10.1145/1809842},
  isbn      = {978-1-4503-0049-0},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2010,
  editor    = {Juan A. Garay and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks, 7th International Conference,
               {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6280},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15317-4},
  doi       = {10.1007/978-3-642-15317-4},
  isbn      = {978-3-642-15316-7},
  timestamp = {Fri, 26 May 2017 00:49:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2010,
  editor    = {Daniele Micciancio},
  title     = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5978},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2},
  doi       = {10.1007/978-3-642-11799-2},
  isbn      = {978-3-642-11798-5},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009,
  editor    = {Ehab Al{-}Shaer and
               Somesh Jha and
               Angelos D. Keromytis},
  title     = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-894-0},
  timestamp = {Wed, 25 Nov 2009 10:26:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2009,
  editor    = {Shai Halevi},
  title     = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5677},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8},
  doi       = {10.1007/978-3-642-03356-8},
  isbn      = {978-3-642-03355-1},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2009,
  editor    = {Antoine Joux},
  title     = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5479},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9},
  doi       = {10.1007/978-3-642-01001-9},
  isbn      = {978-3-642-01000-2},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2009,
  editor    = {Roger Dingledine and
               Philippe Golle},
  title     = {Financial Cryptography and Data Security, 13th International Conference,
               {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5628},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03549-4},
  doi       = {10.1007/978-3-642-03549-4},
  timestamp = {Fri, 26 May 2017 00:50:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2009,
  editor    = {Stanislaw Jarecki and
               Gene Tsudik},
  title     = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5443},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1},
  doi       = {10.1007/978-3-642-00468-1},
  isbn      = {978-3-642-00467-4},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2009,
  editor    = {Michele Bezzi and
               Penny Duquenoy and
               Simone Fischer{-}H{\"{u}}bner and
               Marit Hansen and
               Ge Zhang},
  title     = {Privacy and Identity Management for Life - 5th {IFIP} {WG} 9.2, 9.6/11.4,
               11.6, 11.7/PrimeLife International Summer School, Nice, France, September
               7-11, 2009, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {320},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14282-6},
  doi       = {10.1007/978-3-642-14282-6},
  isbn      = {978-3-642-14281-9},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/primelife/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2008,
  editor    = {Josef Pieprzyk},
  title     = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5350},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7},
  doi       = {10.1007/978-3-540-89255-7},
  isbn      = {978-3-540-89254-0},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008,
  editor    = {Peng Ning and
               Paul F. Syverson and
               Somesh Jha},
  title     = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-810-7},
  timestamp = {Tue, 11 Nov 2008 10:39:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2008,
  editor    = {Elisa Bertino and
               Kenji Takahashi},
  title     = {Proceedings of the 4th Workshop on Digital Identity Management, Alexandria,
               VA, USA, October 31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-294-8},
  timestamp = {Tue, 11 Nov 2008 17:25:33 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dim/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2007,
  editor    = {Moni Naor},
  title     = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4515},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4},
  doi       = {10.1007/978-3-540-72540-4},
  isbn      = {978-3-540-72539-8},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2007,
  title     = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
               May 2007, Oakland, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4223200},
  isbn      = {0-7695-2848-1},
  timestamp = {Thu, 08 Jan 2015 16:59:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/PJ2007,
  editor    = {Milan Petkovic and
               Willem Jonker},
  title     = {Security, Privacy, and Trust in Modern Data Management},
  series    = {Data-Centric Systems and Applications},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-69861-6},
  doi       = {10.1007/978-3-540-69861-6},
  isbn      = {978-3-540-69860-9},
  timestamp = {Tue, 16 May 2017 14:01:42 +0200},
  biburl    = {https://dblp.org/rec/bib/books/sp/PJ2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006usa,
  editor    = {Ari Juels and
               Rebecca N. Wright and
               Sabrina De Capitani di Vimercati},
  title     = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  publisher = {{ACM}},
  year      = {2006},
  timestamp = {Mon, 11 Dec 2006 11:03:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2006usa},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2006,
  editor    = {Ari Juels and
               Marianne Winslett and
               Atsuhiro Goto},
  title     = {Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria,
               VA, USA, November 3, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-547-9},
  timestamp = {Tue, 15 May 2007 12:32:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dim/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2006,
  editor    = {Roberto De Prisco and
               Moti Yung},
  title     = {Security and Cryptography for Networks, 5th International Conference,
               {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4116},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11832072},
  doi       = {10.1007/11832072},
  isbn      = {3-540-38080-9},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2006,
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg and
               Louise Yngstr{\"{o}}m and
               Stefan Lindskog},
  title     = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  series    = {{IFIP}},
  volume    = {201},
  publisher = {Springer},
  year      = {2006},
  isbn      = {0-387-33405-X},
  timestamp = {Tue, 21 Nov 2006 10:57:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2006,
  editor    = {Ari Juels and
               Marianne Winslett},
  title     = {Proceedings of the 2006 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2006, Alexandria, VA, USA, October 30, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-556-8},
  timestamp = {Mon, 07 Apr 2008 08:26:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005,
  editor    = {Vijay Atluri and
               Catherine A. Meadows and
               Ari Juels},
  title     = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-226-7},
  timestamp = {Mon, 14 Mar 2016 15:38:52 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2005,
  editor    = {Victor Shoup},
  title     = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3621},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11535218},
  doi       = {10.1007/11535218},
  isbn      = {3-540-28114-2},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2005,
  editor    = {Vijay Atluri and
               Pierangela Samarati and
               Atsuhiro Goto},
  title     = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax,
               VA, USA, November 11, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-232-1},
  timestamp = {Wed, 27 Sep 2006 13:03:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dim/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2005,
  editor    = {Ronald Cramer},
  title     = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3494},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b136415},
  doi       = {10.1007/b136415},
  isbn      = {3-540-25910-4},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2005,
  editor    = {George Danezis and
               David M. Martin Jr.},
  title     = {Privacy Enhancing Technologies, 5th International Workshop, {PET}
               2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3856},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11767831},
  doi       = {10.1007/11767831},
  isbn      = {3-540-34745-3},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2005,
  editor    = {Serge Vaudenay},
  title     = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
               Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
               January 23-26, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3386},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b105124},
  doi       = {10.1007/b105124},
  isbn      = {3-540-24454-9},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2005,
  editor    = {Vijay Atluri and
               Sabrina De Capitani di Vimercati and
               Roger Dingledine},
  title     = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-228-3},
  timestamp = {Thu, 09 Mar 2006 14:46:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004ccs,
  editor    = {Vijayalakshmi Atluri and
               Birgit Pfitzmann and
               Patrick D. McDaniel},
  title     = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-961-6},
  timestamp = {Thu, 17 Nov 2016 19:38:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2004ccs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2004,
  editor    = {Matthew K. Franklin},
  title     = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
               CryptologyConference, Santa Barbara, California, USA, August 15-19,
               2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3152},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b99099},
  doi       = {10.1007/b99099},
  isbn      = {3-540-22668-0},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2004,
  editor    = {Pierangela Samarati and
               Peter Y. A. Ryan and
               Dieter Gollmann and
               Refik Molva},
  title     = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
               Computer Security, Sophia Antipolis, France, September 13-15, 2004,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3193},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b100085},
  doi       = {10.1007/b100085},
  isbn      = {3-540-22987-6},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2004,
  editor    = {Carlo Blundo and
               Stelvio Cimato},
  title     = {Security in Communication Networks, 4th International Conference,
               {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3352},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b105083},
  doi       = {10.1007/b105083},
  isbn      = {3-540-24301-1},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2004,
  editor    = {Bruce Christianson and
               Bruno Crispo and
               James A. Malcolm and
               Michael Roe},
  title     = {Security Protocols, 12th International Workshop, Cambridge, UK, April
               26-28, 2004. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3957},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11861386},
  doi       = {10.1007/11861386},
  isbn      = {3-540-40925-4},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spw/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2003,
  editor    = {Dan Boneh},
  title     = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2729},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b11817},
  doi       = {10.1007/b11817},
  isbn      = {3-540-40674-3},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2002,
  editor    = {Vijayalakshmi Atluri},
  title     = {Proceedings of the 9th {ACM} Conference on Computer and Communications
               Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  publisher = {{ACM}},
  year      = {2002},
  url       = {http://dl.acm.org/citation.cfm?id=586110},
  isbn      = {1-58113-612-9},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2002,
  editor    = {Moti Yung},
  title     = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2442},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45708-9},
  doi       = {10.1007/3-540-45708-9},
  isbn      = {3-540-44050-X},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2002,
  editor    = {Stelvio Cimato and
               Clemente Galdi and
               Giuseppe Persiano},
  title     = {Security in Communication Networks, Third International Conference,
               {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2576},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36413-7},
  doi       = {10.1007/3-540-36413-7},
  isbn      = {3-540-00420-3},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2001,
  editor    = {Joe Kilian},
  title     = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2139},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44647-8},
  doi       = {10.1007/3-540-44647-8},
  isbn      = {3-540-42456-3},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2001,
  editor    = {Birgit Pfitzmann},
  title     = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
               on the Theory and Application of Cryptographic Techniques, Innsbruck,
               Austria, May 6-10, 2001, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {2045},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44987-6},
  doi       = {10.1007/3-540-44987-6},
  isbn      = {3-540-42070-3},
  timestamp = {Fri, 26 May 2017 14:09:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2001,
  title     = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California,
               {USA} May 14-16, 2001},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7367},
  isbn      = {0-7695-1046-9},
  timestamp = {Thu, 08 Jan 2015 16:59:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2000,
  editor    = {Tatsuaki Okamoto},
  title     = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1976},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44448-3},
  doi       = {10.1007/3-540-44448-3},
  isbn      = {3-540-41404-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2000,
  editor    = {Mihir Bellare},
  title     = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1880},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44598-6},
  doi       = {10.1007/3-540-44598-6},
  isbn      = {3-540-67907-3},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2000,
  editor    = {Bart Preneel},
  title     = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1807},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-45539-6},
  doi       = {10.1007/3-540-45539-6},
  isbn      = {3-540-67517-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2000,
  editor    = {Ugo Montanari and
               Jos{\'{e}} D. P. Rolim and
               Emo Welzl},
  title     = {Automata, Languages and Programming, 27th International Colloquium,
               {ICALP} 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1853},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-45022-X},
  doi       = {10.1007/3-540-45022-X},
  isbn      = {3-540-67715-1},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1999,
  editor    = {Michael J. Wiener},
  title     = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1666},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48405-1},
  doi       = {10.1007/3-540-48405-1},
  isbn      = {3-540-66347-9},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/99,
  editor    = {Jacques Stern},
  title     = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1592},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48910-X},
  doi       = {10.1007/3-540-48910-X},
  isbn      = {3-540-65889-0},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1998,
  editor    = {Kazuo Ohta and
               Dingyi Pei},
  title     = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1514},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/3-540-49649-1},
  doi       = {10.1007/3-540-49649-1},
  isbn      = {3-540-65109-8},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1997,
  editor    = {Burton S. Kaliski Jr.},
  title     = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1294},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0052223},
  doi       = {10.1007/BFb0052223},
  isbn      = {3-540-63384-7},
  timestamp = {Mon, 22 May 2017 17:11:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/97,
  editor    = {Walter Fumy},
  title     = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1233},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/3-540-69053-0},
  doi       = {10.1007/3-540-69053-0},
  isbn      = {3-540-62975-0},
  timestamp = {Mon, 22 May 2017 17:12:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/1996,
  editor    = {Li Gong and
               Jacques Stearn},
  title     = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
               Communications Security, New Delhi, India, March 14-16, 1996},
  publisher = {{ACM}},
  year      = {1996},
  url       = {http://dl.acm.org/citation.cfm?id=238168},
  isbn      = {0-89791-829-0},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/1996,
  editor    = {Elisa Bertino and
               Helmut Kurth and
               Giancarlo Martella and
               Emilio Montolivo},
  title     = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
               in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1146},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-61770-1},
  doi       = {10.1007/3-540-61770-1},
  isbn      = {3-540-61770-1},
  timestamp = {Mon, 22 May 2017 16:14:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/95,
  editor    = {Louis C. Guillou and
               Jean{-}Jacques Quisquater},
  title     = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
               on the Theory and Application of Cryptographic Techniques, Saint-Malo,
               France, May 21-25, 1995, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {921},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/3-540-49264-X},
  doi       = {10.1007/3-540-49264-X},
  isbn      = {3-540-59409-4},
  timestamp = {Mon, 22 May 2017 12:56:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/95},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gi/1995,
  editor    = {Friedbert Huber{-}W{\"{a}}schle and
               Helmut Schauer and
               Peter Widmayer},
  title     = {{GISI} 95, Herausforderungen eines globalen Informationsverbundes
               f{\"{u}}r die Informatik, 25. GI-Jahrestagung und 13. Schweizer
               Informatikertag, Z{\"{u}}rich, Schweiz, 18.-20. September 1995},
  series    = {Informatik Aktuell},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/978-3-642-79958-7},
  doi       = {10.1007/978-3-642-79958-7},
  isbn      = {3-540-60213-5},
  timestamp = {Tue, 23 May 2017 01:10:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gi/1995},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/1994,
  editor    = {Dieter Gollmann},
  title     = {Computer Security - {ESORICS} 94, Third European Symposium on Research
               in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  publisher = {Springer},
  year      = {1994},
  url       = {https://doi.org/10.1007/3-540-58618-0},
  doi       = {10.1007/3-540-58618-0},
  isbn      = {3-540-58618-0},
  timestamp = {Sat, 20 May 2017 15:32:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/1994},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/94,
  editor    = {Alfredo De Santis},
  title     = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {950},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/BFb0053418},
  doi       = {10.1007/BFb0053418},
  isbn      = {3-540-60176-7},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier