|
Search the dblp DataBase
Markus Stadler:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jan Camenisch, Jean-Marc Piveteau, Markus Stadler
An Efficient Fair Payment System. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:88-94 [Conf]
- Jan Camenisch, Markus Stadler
Efficient Group Signature Schemes for Large Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP] CRYPTO, 1997, pp:410-424 [Conf]
- Jan Camenisch, Ueli M. Maurer, Markus Stadler
Digital Payment Systems with Passive Anonymity-Revoking Trustees. [Citation Graph (0, 0)][DBLP] ESORICS, 1996, pp:33-43 [Conf]
- Jan Camenisch, Jean-Marc Piveteau, Markus Stadler
An Efficient Electronic Payment System Protecting Privacy. [Citation Graph (0, 0)][DBLP] ESORICS, 1994, pp:207-215 [Conf]
- Markus Michels, Markus Stadler, Hung-Min Sun
On the Security of Some Variants of the RSA Signature Scheme. [Citation Graph (0, 0)][DBLP] ESORICS, 1998, pp:85-96 [Conf]
- Christian Cachin, Silvio Micali, Markus Stadler
Computationally Private Information Retrieval with Polylogarithmic Communication. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:402-414 [Conf]
- Jan Camenisch, Jean-Marc Piveteau, Markus Stadler
Blind Signatures Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:428-432 [Conf]
- Markus Michels, Markus Stadler
Generic Constructions for Secure and Efficient Confirmer Signature Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:406-421 [Conf]
- Markus Stadler
Publicly Verifiable Secret Sharing. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1996, pp:190-199 [Conf]
- Markus Stadler, Jean-Marc Piveteau, Jan Camenisch
Fair Blind Signatures. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1995, pp:209-219 [Conf]
- Jan Camenisch, Jean-Marc Piveteau, Markus Stadler
Faire anonyme Zahlungssysteme. [Citation Graph (0, 0)][DBLP] GI Jahrestagung, 1995, pp:254-265 [Conf]
- Jan Camenisch, Ueli M. Maurer, Markus Stadler
Digital Payment Systems With Passive Anonymity-Revoking Trustees. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:1, pp:69-90 [Journal]
Search in 0.003secs, Finished in 0.004secs
|