dblp.uni-trier.dewww.uni-trier.de

Jan Camenisch

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
61EEJan Camenisch, Nishanth Chandran, Victor Shoup: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. EUROCRYPT 2009: 351-368
60EEJan Camenisch, Aggelos Kiayias, Moti Yung: On the Portability of Generalized Schnorr Proofs. EUROCRYPT 2009: 425-442
59EEJan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Public Key Cryptography 2009: 196-214
58EEJan Camenisch, Markulf Kohlweiss, Claudio Soriente: An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. Public Key Cryptography 2009: 481-500
2008
57EEJan Camenisch, Thomas Groß: Efficient attributes for anonymous credentials. ACM Conference on Computer and Communications Security 2008: 345-356
56EEJan Camenisch, Rafik Chaabouni, Abhi Shelat: Efficient Protocols for Set Membership and Range Proofs. ASIACRYPT 2008: 234-252
55EEJan Camenisch, Thomas Groß, Thomas S. Heydt-Benjamin: Rethinking accountable privacy supporting services: extended abstract. Digital Identity Management 2008: 1-8
2007
54 Jan Camenisch, Christian S. Collberg, Neil F. Johnson, Phil Sallee: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers Springer 2007
53EEJan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen: Batch Verification of Short Signatures. EUROCRYPT 2007: 246-263
52EEJan Camenisch, Gregory Neven, Abhi Shelat: Simulatable Adaptive Oblivious Transfer. EUROCRYPT 2007: 573-590
51EEJan Camenisch, Anna Lysyanskaya, Mira Meyerovich: Endorsed E-Cash. IEEE Symposium on Security and Privacy 2007: 101-115
50EEAbhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Groß, Dieter Sommer: User centricity: A taxonomy and open issues. Journal of Computer Security 15(5): 493-527 (2007)
2006
49EEJan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich: How to win the clonewars: efficient periodic n-times anonymous authentication. ACM Conference on Computer and Communications Security 2006: 201-210
48EEAbhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Groß, Dieter Sommer: User centricity: a taxonomy and open issues. Digital Identity Management 2006: 1-10
47EEJan Camenisch, Abhi Shelat, Dieter Sommer, Roger Zimmermann: Securing user inputs for the web. Digital Identity Management 2006: 33-44
46EEJan Camenisch, Susan Hohenberger, Anna Lysyanskaya: Balancing Accountability and Privacy Using E-Cash (Extended Abstract). SCN 2006: 141-155
45EEJan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147
44EEJan Camenisch, Dieter Sommer, Roger Zimmermann: A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. SEC 2006: 25-37
43EEJan Camenisch: Anonymous Credentials: Opportunities and Challenges. SEC 2006: 460
42EEJan Camenisch, Thomas Groß, Dieter Sommer: Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. WPES 2006: 67-72
41EEJan Camenisch, Maciej Koprowski: Fine-grained forward-secure signature schemes without random oracles. Discrete Applied Mathematics 154(2): 175-188 (2006)
2005
40EEGiuseppe Ateniese, Jan Camenisch, Breno de Medeiros: Untraceable RFID tags via insubvertible encryption. ACM Conference on Computer and Communications Security 2005: 92-101
39EEJan Camenisch, Anna Lysyanskaya: A Formal Treatment of Onion Routing. CRYPTO 2005: 169-187
38EEJan Camenisch, Abhi Shelat, Dieter Sommer, Simone Fischer-Hübner, Marit Hansen, Henry Krasemann, Gérard Lacoste, Ronald Leenes, Jimmy C. Tseng: Privacy and identity management for everyone. Digital Identity Management 2005: 20-27
37EEJan Camenisch, Susan Hohenberger, Anna Lysyanskaya: Compact E-Cash. EUROCRYPT 2005: 302-321
36EEJan Camenisch, Anton Mityagin: Mix-Network with Stronger Security. Privacy Enhancing Technologies 2005: 128-146
35EEEndre Bangerter, Jan Camenisch, Ueli M. Maurer: Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. Public Key Cryptography 2005: 154-171
34EEMichael Backes, Jan Camenisch, Dieter Sommer: Anonymous yet accountable access control. WPES 2005: 40-46
2004
33 Christian Cachin, Jan Camenisch: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings Springer 2004
32EEErnest F. Brickell, Jan Camenisch, Liqun Chen: Direct anonymous attestation. ACM Conference on Computer and Communications Security 2004: 132-145
31EEJan Camenisch, Anna Lysyanskaya: Signature Schemes and Anonymous Credentials from Bilinear Maps. CRYPTO 2004: 56-72
30EEJan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88
29EEJan Camenisch, Jens Groth: Group Signatures: Better Efficiency and New Theoretical Aspects. SCN 2004: 120-133
28EEJan Camenisch, Maciej Koprowski, Bogdan Warinschi: Efficient Blind Signatures Without Random Oracles. SCN 2004: 134-148
27EEEndre Bangerter, Jan Camenisch, Anna Lysyanskaya: A Cryptographic Framework for the Controlled Release of Certified Data. Security Protocols Workshop 2004: 20-42
2003
26EEJan Camenisch, Victor Shoup: Practical Verifiable Encryption and Decryption of Discrete Logarithms. CRYPTO 2003: 126-144
2002
25EEJan Camenisch, Els Van Herreweghen: Design and implementation of the idemix anonymous credential system. ACM Conference on Computer and Communications Security 2002: 21-30
24EEJoy Algesheimer, Jan Camenisch, Victor Shoup: Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. CRYPTO 2002: 417-432
23EEJan Camenisch, Anna Lysyanskaya: Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. CRYPTO 2002: 61-76
22EEJan Camenisch, Anna Lysyanskaya: A Signature Scheme with Efficient Protocols. SCN 2002: 268-289
2001
21EEJan Camenisch, Anna Lysyanskaya: An Identity Escrow Scheme with Appointed Verifiers. CRYPTO 2001: 388-407
20EEJan Camenisch, Anna Lysyanskaya: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. EUROCRYPT 2001: 93-118
19EEJoy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth: Cryptographic Security for Mobile Code. IEEE Symposium on Security and Privacy 2001: 2-11
2000
18EEJan Camenisch, Ivan Damgård: Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. ASIACRYPT 2000: 331-345
17EEJan Camenisch: Efficient Anonymous Fingerprinting with Group Signatures. ASIACRYPT 2000: 415-428
16EEGiuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270
15EEChristian Cachin, Jan Camenisch: Optimistic Fair Secure Computation. CRYPTO 2000: 93-111
14EEJan Camenisch, Markus Michels: Confirmer Signature Schemes Secure against Adaptive Adversaries. EUROCRYPT 2000: 243-258
13EEChristian Cachin, Jan Camenisch, Joe Kilian, Joy Müller: One-Round Secure Computation and Secure Autonomous Mobile Agents. ICALP 2000: 512-523
1999
12EEJan Camenisch, Markus Michels: Separability and Efficiency for Generic Group Signature Schemes. CRYPTO 1999: 413-430
11EEJan Camenisch, Markus Michels: Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes. EUROCRYPT 1999: 107-122
1998
10EEJan Camenisch, Markus Michels: A Group Signature Scheme with Improved Efficiency. ASIACRYPT 1998: 160-174
1997
9EEJan Camenisch, Markus Stadler: Efficient Group Signature Schemes for Large Groups (Extended Abstract). CRYPTO 1997: 410-424
8EEJan Camenisch: Efficient and Generalized Group Signatures. EUROCRYPT 1997: 465-479
7 Jan Camenisch, Ueli M. Maurer, Markus Stadler: Digital Payment Systems With Passive Anonymity-Revoking Trustees. Journal of Computer Security 5(1): 69-90 (1997)
1996
6EEJan Camenisch, Jean-Marc Piveteau, Markus Stadler: An Efficient Fair Payment System. ACM Conference on Computer and Communications Security 1996: 88-94
5EEJan Camenisch, Ueli M. Maurer, Markus Stadler: Digital Payment Systems with Passive Anonymity-Revoking Trustees. ESORICS 1996: 33-43
1995
4EEMarkus Stadler, Jean-Marc Piveteau, Jan Camenisch: Fair Blind Signatures. EUROCRYPT 1995: 209-219
3 Jan Camenisch, Jean-Marc Piveteau, Markus Stadler: Faire anonyme Zahlungssysteme. GI Jahrestagung 1995: 254-265
1994
2EEJan Camenisch, Jean-Marc Piveteau, Markus Stadler: An Efficient Electronic Payment System Protecting Privacy. ESORICS 1994: 207-215
1EEJan Camenisch, Jean-Marc Piveteau, Markus Stadler: Blind Signatures Based on the Discrete Logarithm Problem. EUROCRYPT 1994: 428-432

Coauthor Index

1Joy Algesheimer [19] [24]
2Giuseppe Ateniese [16] [40]
3Michael Backes [34]
4Endre Bangerter [27] [35]
5Abhilasha Bhargav-Spantzel [48] [50]
6Ernest F. Brickell [32]
7Christian Cachin [13] [15] [19] [33]
8Rafik Chaabouni [56]
9Nishanth Chandran [61]
10Liqun Chen [32]
11Christian S. Collberg [54]
12Ivan Damgård [18]
13Simone Fischer-Hübner [38]
14Thomas Groß [42] [48] [50] [55] [57]
15Jens Groth [29]
16Marit Hansen [38]
17Els Van Herreweghen [25]
18Thomas S. Heydt-Benjamin [55]
19Susan Hohenberger [37] [46] [49] [53]
20Neil F. Johnson [54]
21Marc Joye [16]
22Günter Karjoth [19]
23Aggelos Kiayias [60]
24Joe Kilian [13]
25Markulf Kohlweiss [49] [58] [59]
26Maciej Koprowski [28] [41]
27Henry Krasemann [38]
28Gérard Lacoste [38]
29Ronald Leenes [38]
30Anna Lysyanskaya [20] [21] [22] [23] [27] [31] [37] [39] [46] [49] [51]
31Ueli M. Maurer [5] [7] [35]
32Breno de Medeiros [40]
33Mira Meyerovich [49] [51]
34Markus Michels [10] [11] [12] [14]
35Anton Mityagin [36]
36Joy Müller [13]
37Gregory Neven [52]
38Michael Østergaard Pedersen [53]
39Jean-Marc Piveteau [1] [2] [3] [4] [6]
40Alfredo Rial [59]
41Phil Sallee [54]
42Caroline Sheedy [59]
43Abhi Shelat [38] [47] [52] [56]
44Victor Shoup [24] [26] [61]
45Dieter Sommer [34] [38] [42] [44] [47] [48] [50]
46Claudio Soriente [58]
47Markus Stadler [1] [2] [3] [4] [5] [6] [7] [9]
48Jimmy C. Tseng [38]
49Gene Tsudik [16]
50Bogdan Warinschi [28]
51Moti Yung (Mordechai M. Yung) [60]
52Roger Zimmermann [44] [47]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)