Cited By
View all- Hölzl MRoland MMir OMayrhofer RHaddad HWainwright RChbeir R(2018)Bridging the gap in privacy-preserving revocationProceedings of the 33rd Annual ACM Symposium on Applied Computing10.1145/3167132.3167303(1601-1609)Online publication date: 9-Apr-2018
- Lipmaa H(2012)Secure accumulators from euclidean rings without trusted setupProceedings of the 10th international conference on Applied Cryptography and Network Security10.1007/978-3-642-31284-7_14(224-240)Online publication date: 26-Jun-2012
- Papamanthou CTamassia RTriandopoulos NNing PSyverson PJha S(2008)Authenticated hash tablesProceedings of the 15th ACM conference on Computer and communications security10.1145/1455770.1455826(437-448)Online publication date: 27-Oct-2008