Zhao, Xiaopeng; Cao, Zhenfu; Dong, Xiaolei; Shao, Jun Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity. (English) Zbl 07308509 Des. Codes Cryptography 89, No. 2, 241-253 (2021). MSC: 11T71 11R04 11R09 11R58 PDF BibTeX XML Cite \textit{X. Zhao} et al., Des. Codes Cryptography 89, No. 2, 241--253 (2021; Zbl 07308509) Full Text: DOI
Takayasu, Atsushi; Watanabe, Yohei Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more. (English) Zbl 07285597 Theor. Comput. Sci. 849, 64-98 (2021). MSC: 68Q PDF BibTeX XML Cite \textit{A. Takayasu} and \textit{Y. Watanabe}, Theor. Comput. Sci. 849, 64--98 (2021; Zbl 07285597) Full Text: DOI
Huang, Jianye; Huang, Qiong; Susilo, Willy Leakage-resilient group signature: definitions and constructions. (English) Zbl 07324639 Inf. Sci. 509, 119-132 (2020). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{J. Huang} et al., Inf. Sci. 509, 119--132 (2020; Zbl 07324639) Full Text: DOI
Hoang, Anh-Tu; Carminati, Barbara; Ferrari, Elena Cluster-based anonymization of knowledge graphs. (English) Zbl 07314387 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 104-123 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{A.-T. Hoang} et al., Lect. Notes Comput. Sci. 12147, 104--123 (2020; Zbl 07314387) Full Text: DOI
Wang, Hui; Cheng, Zhengxing \(a\)-diversity \(k\)-anonymity large data adaptive delay scheduling algorithm based on wavelet analysis. (Chinese. English summary) Zbl 07295390 J. Jilin Univ., Sci. 58, No. 3, 620-626 (2020). MSC: 68M20 42C40 PDF BibTeX XML Cite \textit{H. Wang} and \textit{Z. Cheng}, J. Jilin Univ., Sci. 58, No. 3, 620--626 (2020; Zbl 07295390) Full Text: DOI
Bonifacio, Agustín G.; Massó, Jordi On strategy-proofness and semilattice single-peakedness. (English) Zbl 1452.91130 Games Econ. Behav. 124, 219-238 (2020). MSC: 91B14 91B08 06A12 PDF BibTeX XML Cite \textit{A. G. Bonifacio} and \textit{J. Massó}, Games Econ. Behav. 124, 219--238 (2020; Zbl 1452.91130) Full Text: DOI
Kansal, Meenakshi; Dutta, Ratna; Mukhopadhyay, Sourav Group signature from lattices preserving forward security in dynamic setting. (English) Zbl 07271221 Adv. Math. Commun. 14, No. 4, 535-553 (2020). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{M. Kansal} et al., Adv. Math. Commun. 14, No. 4, 535--553 (2020; Zbl 07271221) Full Text: DOI
Dubey, Ram Sewak; Laguzzi, Giorgio; Ruscitti, Francesco On the representation and construction of equitable social welfare orders. (English) Zbl 1448.91103 Math. Soc. Sci. 107, 17-22 (2020). MSC: 91B15 PDF BibTeX XML Cite \textit{R. S. Dubey} et al., Math. Soc. Sci. 107, 17--22 (2020; Zbl 1448.91103) Full Text: DOI
Lagerås, Andreas; Lindholm, Mathias How to ask sensitive multiple-choice questions. (English) Zbl 1452.62166 Scand. J. Stat. 47, No. 2, 397-424 (2020). Reviewer: T. J. Rao (Visakhapatnam) MSC: 62D05 62A01 62P25 PDF BibTeX XML Cite \textit{A. Lagerås} and \textit{M. Lindholm}, Scand. J. Stat. 47, No. 2, 397--424 (2020; Zbl 1452.62166) Full Text: DOI
Paskin-Cherniavsky, Anat; Olimid, Ruxandra F. On cryptographic anonymity and unpredictability in secret sharing. (English) Zbl 1441.94092 Inf. Process. Lett. 161, Article ID 105965, 4 p. (2020). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{A. Paskin-Cherniavsky} and \textit{R. F. Olimid}, Inf. Process. Lett. 161, Article ID 105965, 4 p. (2020; Zbl 1441.94092) Full Text: DOI
Balbuzanov, Ivan Short trading cycles: paired kidney exchange with strict ordinal preferences. (English) Zbl 1435.91124 Math. Soc. Sci. 104, 78-87 (2020). MSC: 91B68 PDF BibTeX XML Cite \textit{I. Balbuzanov}, Math. Soc. Sci. 104, 78--87 (2020; Zbl 1435.91124) Full Text: DOI
Monedero, David Rebollo; Mezher, Ahmad Mohamad; Colomé, Xavier Casanova; Forné, Jordi; Soriano, Miguel Efficient \(k\)-anonymous microaggregation of multivariate numerical data via principal component analysis. (English) Zbl 07306152 Inf. Sci. 503, 417-443 (2019). MSC: 62H25 62R07 62-08 PDF BibTeX XML Cite \textit{D. R. Monedero} et al., Inf. Sci. 503, 417--443 (2019; Zbl 07306152) Full Text: DOI
Jabbari, A.; Mohasefi, J. B. Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table. (English) Zbl 1437.94082 Nonlinear Dyn. 95, No. 4, 3177-3191 (2019). MSC: 94A62 94A60 37D45 11T71 PDF BibTeX XML Cite \textit{A. Jabbari} and \textit{J. B. Mohasefi}, Nonlinear Dyn. 95, No. 4, 3177--3191 (2019; Zbl 1437.94082) Full Text: DOI
Pagnin, Elena; Mitrokotsa, Aikaterini; Tanaka, Keisuke Anonymous single-round server-aided verification. (English) Zbl 1454.94117 Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 23-43 (2019). MSC: 94A62 68Q60 PDF BibTeX XML Cite \textit{E. Pagnin} et al., Lect. Notes Comput. Sci. 11368, 23--43 (2019; Zbl 1454.94117) Full Text: DOI
Kondo, Hikaru Notions of anonymity for object assignment: impossibility theorems. (English) Zbl 1432.91066 Rev. Econ. Des. 23, No. 3-4, 113-126 (2019). MSC: 91B32 PDF BibTeX XML Cite \textit{H. Kondo}, Rev. Econ. Des. 23, No. 3--4, 113--126 (2019; Zbl 1432.91066) Full Text: DOI
Cato, Susumu The possibility of Paretian anonymous decision-making with an infinite population. (English) Zbl 1432.91047 Soc. Choice Welfare 53, No. 4, 587-601 (2019). MSC: 91B14 91B06 PDF BibTeX XML Cite \textit{S. Cato}, Soc. Choice Welfare 53, No. 4, 587--601 (2019; Zbl 1432.91047) Full Text: DOI
Liu, Jia; Manulis, Mark Prate: anonymous star rating with rating secrecy. (English) Zbl 07160807 Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-21567-5/pbk; 978-3-030-21568-2/ebook). Lecture Notes in Computer Science 11464, 550-570 (2019). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{J. Liu} and \textit{M. Manulis}, Lect. Notes Comput. Sci. 11464, 550--570 (2019; Zbl 07160807) Full Text: DOI
Géraud, Rémi; Naccache, David; Roşie, Răzvan Robust encryption (extended). (English) Zbl 07158409 Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer (ISBN 978-3-030-12611-7/pbk; 978-3-030-12612-4/ebook). Lecture Notes in Computer Science 11405, 149-168 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Géraud} et al., Lect. Notes Comput. Sci. 11405, 149--168 (2019; Zbl 07158409) Full Text: DOI
Lu, Zeming; Jiang, Zoe L.; Wu, Yulin; Wang, Xuan; Zhong, Yantao A lattice-based anonymous distributed e-cash from Bitcoin. (English) Zbl 1426.94114 Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 275-287 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{Z. Lu} et al., Lect. Notes Comput. Sci. 11821, 275--287 (2019; Zbl 1426.94114) Full Text: DOI
Zhang, Yinghui; Yang, Menglei; Zheng, Dong; Zhang, Tiantian; Guo, Rui; Ren, Fang Leakage-resilient hierarchical identity-based encryption with recipient anonymity. (English) Zbl 1427.68072 Int. J. Found. Comput. Sci. 30, No. 4, 665-681 (2019). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{Y. Zhang} et al., Int. J. Found. Comput. Sci. 30, No. 4, 665--681 (2019; Zbl 1427.68072) Full Text: DOI
Lai, Qiqi; Yang, Bo; Xia, Zhe; Li, Yannan; Chen, Yuan; Li, Zhenlong Novel identity-based hash proof system with compact master public key from lattices in the standard model. (English) Zbl 1439.94038 Int. J. Found. Comput. Sci. 30, No. 4, 589-606 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{Q. Lai} et al., Int. J. Found. Comput. Sci. 30, No. 4, 589--606 (2019; Zbl 1439.94038) Full Text: DOI
Tseng, Yi-Fan; Fan, Chun-I; Sung, Cheng-Wei On the anonymity of multi-receiver identity-based encryption based on Fujisaki-Okamoto transformation. (English) Zbl 1439.94063 Int. J. Found. Comput. Sci. 30, No. 4, 493-509 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{Y.-F. Tseng} et al., Int. J. Found. Comput. Sci. 30, No. 4, 493--509 (2019; Zbl 1439.94063) Full Text: DOI
Grabisch, Michel; Poindron, Alexis; Rusinowska, Agnieszka A model of anonymous influence with anti-conformist agents. (English) Zbl 1425.91372 J. Econ. Dyn. Control 109, Article ID 103773, 25 p. (2019). MSC: 91D30 91B70 PDF BibTeX XML Cite \textit{M. Grabisch} et al., J. Econ. Dyn. Control 109, Article ID 103773, 25 p. (2019; Zbl 1425.91372) Full Text: DOI
Wang, Zhen; Fan, Jia; Cheng, Lin; An, Hongzhang; Zheng, Haibin; Niu, Junxiang Supervised anonymous authentication scheme. (Chinese. English summary) Zbl 1438.68054 J. Softw. 30, No. 6, 1705-1720 (2019). MSC: 68P25 68P27 94A60 94A62 PDF BibTeX XML Cite \textit{Z. Wang} et al., J. Softw. 30, No. 6, 1705--1720 (2019; Zbl 1438.68054) Full Text: DOI
Desmedt, Yvo; Piper, Fred Perfect anonymity. (English) Zbl 1432.94129 IEEE Trans. Inf. Theory 65, No. 6, 3990-3997 (2019). Reviewer: Olaf Ninnemann (Uffing am Staffelsee) MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{Y. Desmedt} and \textit{F. Piper}, IEEE Trans. Inf. Theory 65, No. 6, 3990--3997 (2019; Zbl 1432.94129) Full Text: DOI
Gao, Ronghai; Zeng, Jiwen; Deng, Lunzhi An efficient certificateless multi-receiver threshold decryption scheme. (English) Zbl 1411.94059 RAIRO, Theor. Inform. Appl. 53, No. 1-2, 67-84 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Gao} et al., RAIRO, Theor. Inform. Appl. 53, No. 1--2, 67--84 (2019; Zbl 1411.94059) Full Text: DOI
Hadjibeyli, Benjamin; Wilson, Mark C. Distance rationalization of anonymous and homogeneous voting rules. (English) Zbl 1410.91203 Soc. Choice Welfare 52, No. 3, 559-583 (2019). MSC: 91B14 91B12 91B06 PDF BibTeX XML Cite \textit{B. Hadjibeyli} and \textit{M. C. Wilson}, Soc. Choice Welfare 52, No. 3, 559--583 (2019; Zbl 1410.91203) Full Text: DOI
Bredereck, Robert; Froese, Vincent; Koseler, Marcel; Garlet Millani, Marcelo; Nichterlein, André; Niedermeier, Rolf A parameterized algorithmics framework for degree sequence completion problems in directed graphs. (English) Zbl 1421.68108 Algorithmica 81, No. 4, 1584-1614 (2019). MSC: 68R10 05C20 68Q25 PDF BibTeX XML Cite \textit{R. Bredereck} et al., Algorithmica 81, No. 4, 1584--1614 (2019; Zbl 1421.68108) Full Text: DOI
Libert, Benoît; Ling, San; Mouhartem, Fabrice; Nguyen, Khoa; Wang, Huaxiong Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption. (English) Zbl 1423.94085 Theor. Comput. Sci. 759, 72-97 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Libert} et al., Theor. Comput. Sci. 759, 72--97 (2019; Zbl 1423.94085) Full Text: DOI
Huang, Jianye; Huang, Qiong; Susilo, Willy Leakage-resilient ring signature schemes. (English) Zbl 1423.94129 Theor. Comput. Sci. 759, 1-13 (2019). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{J. Huang} et al., Theor. Comput. Sci. 759, 1--13 (2019; Zbl 1423.94129) Full Text: DOI
Wang, Ping; Zhang, Zijian; Wang, Ding Revisiting anonymous two-factor authentication schemes for multi-server environment. (English) Zbl 07297669 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 805-816 (2018). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{P. Wang} et al., Lect. Notes Comput. Sci. 11149, 805--816 (2018; Zbl 07297669) Full Text: DOI
Perera, Maharage Nisansala Sevwandi; Koshiba, Takeshi Achieving full security for lattice-based group signatures with verifier-local revocation. (English) Zbl 07297636 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). Lecture Notes in Computer Science 11149, 287-302 (2018). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{M. N. S. Perera} and \textit{T. Koshiba}, Lect. Notes Comput. Sci. 11149, 287--302 (2018; Zbl 07297636) Full Text: DOI
Li, Jiguo; Chen, Liqing; Lu, Yang; Zhang, Yichen Anonymous certificate-based broadcast encryption with constant decryption cost. (English) Zbl 1440.94065 Inf. Sci. 454-455, 110-127 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Li} et al., Inf. Sci. 454--455, 110--127 (2018; Zbl 1440.94065) Full Text: DOI
Mo, Ruo; Ma, Jianfeng; Liu, Ximeng; Li, Qi FABSS: attribute-based sanitizable signature for flexible access structure. (English) Zbl 1452.94079 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 39-50 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Mo} et al., Lect. Notes Comput. Sci. 10631, 39--50 (2018; Zbl 1452.94079) Full Text: DOI
Blömer, Johannes; Eidens, Fabian; Juhnke, Jakob Practical, anonymous, and publicly linkable universally-composable reputation systems. (English) Zbl 07154117 Smart, Nigel P. (ed.), Topics in cryptology – CT-RSA 2018. The cryptographers’ track at the RSA conference 2018, San Francisco, CA, USA, April 16–20, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-76952-3/pbk; 978-3-319-76953-0/ebook). Lecture Notes in Computer Science 10808, 470-490 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Blömer} et al., Lect. Notes Comput. Sci. 10808, 470--490 (2018; Zbl 07154117) Full Text: DOI
Tian, Yangguang; Li, Yingjiu; Sengupta, Binanda; Deng, Robert Huijie; Ching, Albert; Liu, Weiwei Privacy-preserving remote user authentication with \(k\)-times untraceability. (English) Zbl 07124905 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer (ISBN 978-3-030-14233-9/pbk; 978-3-030-14234-6/ebook). Lecture Notes in Computer Science 11449, 647-657 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Tian} et al., Lect. Notes Comput. Sci. 11449, 647--657 (2018; Zbl 07124905) Full Text: DOI
Liu, Xudong; Zhang, Wenfang; Wang, Xiaomin Multi-authority attribute-based alterable threshold ring signature without central authority. (Chinese. English summary) Zbl 1424.94071 J. Softw. 29, No. 11, 3528-3543 (2018). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{X. Liu} et al., J. Softw. 29, No. 11, 3528--3543 (2018; Zbl 1424.94071) Full Text: DOI
Tian, Miaomiao; Wang, Lingyan; Zhong, Hong; Chen, Jie Attribute-based data integrity checking for cloud storage. (English) Zbl 1407.68140 Fundam. Inform. 163, No. 4, 395-411 (2018). MSC: 68P20 94A60 PDF BibTeX XML Cite \textit{M. Tian} et al., Fundam. Inform. 163, No. 4, 395--411 (2018; Zbl 1407.68140) Full Text: DOI
Wang, Ding; Li, Wenting; Wang, Ping Cryptanalysis of three anonymous authentication schemes for multi-server environment. (Chinese. English summary) Zbl 1438.94061 J. Softw. 29, No. 7, 1937-1952 (2018). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{D. Wang} et al., J. Softw. 29, No. 7, 1937--1952 (2018; Zbl 1438.94061) Full Text: DOI
Delporte-Gallet, Carole; Fauconnier, Hugues; Rajsbaum, Sergio; Yanagisawa, Nayuta A characterization of \(t\)-resilient colorless task anonymous solvability. (English) Zbl 07008456 Lotker, Zvi (ed.) et al., Structural information and communication complexity. 25th international colloquium, SIROCCO 2018, Ma’ale HaHamisha, Israel, June 18–21, 2018. Revised selected papers. Cham: Springer (ISBN 978-3-030-01324-0/pbk; 978-3-030-01325-7/ebook). Lecture Notes in Computer Science 11085, 178-192 (2018). MSC: 68Mxx 68R10 PDF BibTeX XML Cite \textit{C. Delporte-Gallet} et al., Lect. Notes Comput. Sci. 11085, 178--192 (2018; Zbl 07008456) Full Text: DOI
Dritsas, Elias; Trigka, Maria; Gerolymatos, Panagiotis; Sioutas, Spyros Trajectory clustering and \(k\)-NN for robust privacy preserving spatiotemporal databases. (English) Zbl 07003858 Algorithms (Basel) 11, No. 12, Paper No. 207, 19 p. (2018). MSC: 68 94 PDF BibTeX XML Cite \textit{E. Dritsas} et al., Algorithms (Basel) 11, No. 12, Paper No. 207, 19 p. (2018; Zbl 07003858) Full Text: DOI
Bachrach, Yoram; Elkind, Edith; Malizia, Enrico; Meir, Reshef; Pasechnik, Dmitrii; Rosenschein, Jeffrey S.; Rothe, Jörg; Zuckerman, Michael Bounds on the cost of stabilizing a cooperative game. (English) Zbl 1454.91012 J. Artif. Intell. Res. (JAIR) 63, 987-1023 (2018). MSC: 91A12 91A68 68Q17 PDF BibTeX XML Cite \textit{Y. Bachrach} et al., J. Artif. Intell. Res. (JAIR) 63, 987--1023 (2018; Zbl 1454.91012) Full Text: DOI
Kurihara, Takashi Axiomatic characterisations of the basic best-worst rule. (English) Zbl 1406.91118 Econ. Lett. 172, 19-22 (2018). MSC: 91B14 PDF BibTeX XML Cite \textit{T. Kurihara}, Econ. Lett. 172, 19--22 (2018; Zbl 1406.91118) Full Text: DOI
Salas, Julián; Domingo-Ferrer, Josep Some basics on privacy techniques, anonymization and their big data challenges. (English) Zbl 1432.68136 Math. Comput. Sci. 12, No. 3, 263-274 (2018). MSC: 68P27 68P25 68T09 94A60 PDF BibTeX XML Cite \textit{J. Salas} and \textit{J. Domingo-Ferrer}, Math. Comput. Sci. 12, No. 3, 263--274 (2018; Zbl 1432.68136) Full Text: DOI
Zhou, Yanwei; Yang, Bo; Wang, Qinglong Anonymous hybrid signcryption scheme with multi-receiver (multi-message) based on identity. (Chinese. English summary) Zbl 1413.94055 J. Softw. 29, No. 2, 442-455 (2018). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{Y. Zhou} et al., J. Softw. 29, No. 2, 442--455 (2018; Zbl 1413.94055) Full Text: DOI
Li, Chun-Ta; Chen, Chin-Ling; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Chien-Ming A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. (English) Zbl 1398.94199 Soft Comput. 22, No. 8, 2495-2506 (2018). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{C.-T. Li} et al., Soft Comput. 22, No. 8, 2495--2506 (2018; Zbl 1398.94199) Full Text: DOI
Ishida, Ai; Sakai, Yusuke; Emura, Keita; Hanaoka, Goichiro; Tanaka, Keisuke Fully anonymous group signature with verifier-local revocation. (English) Zbl 1444.94121 Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 23-42 (2018). MSC: 94A62 PDF BibTeX XML Cite \textit{A. Ishida} et al., Lect. Notes Comput. Sci. 11035, 23--42 (2018; Zbl 1444.94121) Full Text: DOI
Boyen, Xavier; Haines, Thomas Forward-secure linkable ring signatures. (English) Zbl 1444.94048 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 245-264 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{X. Boyen} and \textit{T. Haines}, Lect. Notes Comput. Sci. 10946, 245--264 (2018; Zbl 1444.94048) Full Text: DOI
Thorncharoensri, Pairat; Susilo, Willy; Mu, Yi Policy controlled system with anonymity. (English) Zbl 1408.94968 Theor. Comput. Sci. 745, 87-113 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Thorncharoensri} et al., Theor. Comput. Sci. 745, 87--113 (2018; Zbl 1408.94968) Full Text: DOI
Li, Jiangtao; Gong, Junqing Improved anonymous broadcast encryptions – tight security and shorter ciphertext. (English) Zbl 1440.94064 Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 497-515 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Li} and \textit{J. Gong}, Lect. Notes Comput. Sci. 10892, 497--515 (2018; Zbl 1440.94064) Full Text: DOI
Bournez, Olivier; Cohen, Johanne; Rabie, Mikaël Homonym population protocols. (English) Zbl 1392.68095 Theory Comput. Syst. 62, No. 5, 1318-1346 (2018). MSC: 68M14 68M12 68Q05 PDF BibTeX XML Cite \textit{O. Bournez} et al., Theory Comput. Syst. 62, No. 5, 1318--1346 (2018; Zbl 1392.68095) Full Text: DOI
Degabriele, Jean Paul; Stam, Martijn Untagging Tor: a formal treatment of onion encryption. (English) Zbl 1415.94421 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10822, 259-293 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{J. P. Degabriele} and \textit{M. Stam}, Lect. Notes Comput. Sci. 10822, 259--293 (2018; Zbl 1415.94421) Full Text: DOI
King, Sarah Schulz; Powers, Robert C. Beyond neutrality: extended difference of votes rules. (English) Zbl 1393.91048 Math. Soc. Sci. 93, 146-152 (2018). MSC: 91B12 91B14 PDF BibTeX XML Cite \textit{S. S. King} and \textit{R. C. Powers}, Math. Soc. Sci. 93, 146--152 (2018; Zbl 1393.91048) Full Text: DOI
Abdalla, Michel; Bellare, Mihir; Neven, Gregory Robust encryption. (English) Zbl 1444.94035 J. Cryptology 31, No. 2, 307-350 (2018). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Abdalla} et al., J. Cryptology 31, No. 2, 307--350 (2018; Zbl 1444.94035) Full Text: DOI
Bergantiños, Gustavo; Massó, Jordi; Neme, Alejandro On societies choosing social outcomes, and their memberships: internal stability and consistency. (English) Zbl 1395.91164 Theory Decis. 84, No. 1, 83-97 (2018). MSC: 91B14 PDF BibTeX XML Cite \textit{G. Bergantiños} et al., Theory Decis. 84, No. 1, 83--97 (2018; Zbl 1395.91164) Full Text: DOI
Karuppiah, Marimuthu; Pradhan, Akshat; Kumari, Saru; Amin, Ruhul; Rajkumar, S.; Kumar, Rahul Security on “Secure remote login scheme with password and smart card update facilities”. (English) Zbl 07215654 Giri, Debasis (ed.) et al., Mathematics and computing. Third international conference, ICMC 2017, Haldia, India, January 17–21, 2017. Proceedings. Singapore: Springer (ISBN 978-981-10-4641-4/pbk; 978-981-10-4642-1/ebook). Communications in Computer and Information Science 655, 26-33 (2017). MSC: 68M25 94A60 94A62 PDF BibTeX XML Cite \textit{M. Karuppiah} et al., Commun. Comput. Inf. Sci. 655, 26--33 (2017; Zbl 07215654) Full Text: DOI
Chaudhari, Payal; Das, Manik Lal On the security of a searchable anonymous attribute based encryption. (English) Zbl 07215653 Giri, Debasis (ed.) et al., Mathematics and computing. Third international conference, ICMC 2017, Haldia, India, January 17–21, 2017. Proceedings. Singapore: Springer (ISBN 978-981-10-4641-4/pbk; 978-981-10-4642-1/ebook). Communications in Computer and Information Science 655, 16-25 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Chaudhari} and \textit{M. L. Das}, Commun. Comput. Inf. Sci. 655, 16--25 (2017; Zbl 07215653) Full Text: DOI
Zhang, Yinghui; Chen, Xiaofeng; Li, Jin; Wong, Duncan S.; Li, Hui; You, Ilsun Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. (English) Zbl 1429.68068 Inf. Sci. 379, 42-61 (2017). MSC: 68P27 68M11 68P25 PDF BibTeX XML Cite \textit{Y. Zhang} et al., Inf. Sci. 379, 42--61 (2017; Zbl 1429.68068) Full Text: DOI
Yoshida, Yusuke; Morozov, Kirill; Tanaka, Keisuke CCA2 key-privacy for code-based encryption in the standard model. (English) Zbl 1437.94078 Lange, Tanja (ed.) et al., Post-quantum cryptography. 8th international workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10346, 35-50 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Yoshida} et al., Lect. Notes Comput. Sci. 10346, 35--50 (2017; Zbl 1437.94078) Full Text: DOI
Hamm, Jihun Minimax filter: learning to preserve privacy from inference attacks. (English) Zbl 1442.62025 J. Mach. Learn. Res. 18(2017-2018), Paper No. 129, 31 p. (2017). MSC: 62C20 62H30 62R07 62P15 68T05 PDF BibTeX XML Cite \textit{J. Hamm}, J. Mach. Learn. Res. 18, Paper No. 129, 31 p. (2017; Zbl 1442.62025) Full Text: Link
Trushina, Oksana; Gabidulin, Ernst Anonymous coherent network coding against eavesdropping and jamming. (English) Zbl 1439.94100 Kabatiansky, Grigory (ed.) et al., Algebraic and combinatorial coding theory – 2016. Selected papers from the 15th international workshop (ACCT-XV), Albena, Bulgaria, June 18–24, 2016. Amsterdam: Elsevier. Electron. Notes Discrete Math. 57, 199-204 (2017). MSC: 94B05 05C90 PDF BibTeX XML Cite \textit{O. Trushina} and \textit{E. Gabidulin}, Electron. Notes Discrete Math. 57, 199--204 (2017; Zbl 1439.94100) Full Text: DOI
Chen, Chin-Ling; Shin, Jungpil; Tsai, Yu-Ting; Castiglione, Aniello; Palmieri, Francesco Securing information exchange in VANETs by using pairing-based cryptography. (English) Zbl 1417.94051 Int. J. Found. Comput. Sci. 28, No. 6, 781-797 (2017). MSC: 94A60 94A62 68P25 68M12 PDF BibTeX XML Cite \textit{C.-L. Chen} et al., Int. J. Found. Comput. Sci. 28, No. 6, 781--797 (2017; Zbl 1417.94051) Full Text: DOI
Libert, Benoît; Ling, San; Nguyen, Khoa; Wang, Huaxiong Zero-knowledge arguments for lattice-based PRFs and applications to E-cash. (English) Zbl 1417.94069 Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10626, 304-335 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Libert} et al., Lect. Notes Comput. Sci. 10626, 304--335 (2017; Zbl 1417.94069) Full Text: DOI
Jakobsen, Sune K. Information theoretical cryptogenography. (English) Zbl 1386.94077 J. Cryptology 30, No. 4, 1067-1115 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{S. K. Jakobsen}, J. Cryptology 30, No. 4, 1067--1115 (2017; Zbl 1386.94077) Full Text: DOI
Behnia, Rouzbeh; Tan, Syh-Yuan; Heng, Swee-Huay Cryptanalysis of an identity-based convertible undeniable signature scheme. (English) Zbl 1410.94044 Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 474-477 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{R. Behnia} et al., Lect. Notes Comput. Sci. 10311, 474--477 (2017; Zbl 1410.94044) Full Text: DOI
Galteland, Herman; Mjølsnes, Stig F.; Olimid, Ruxandra F. Attacks on the basic cMix design: on the necessity of commitments and randomized partial checking. (English) Zbl 1410.94070 Phan, Raphael C.-W. (ed.) et al., Paradigms in cryptology – Mycrypt 2016. Malicious and exploratory cryptology. Second international conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1–2, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10311, 463-473 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Galteland} et al., Lect. Notes Comput. Sci. 10311, 463--473 (2017; Zbl 1410.94070) Full Text: DOI
Jiang, Huowen; Zeng, Guosun; Ma, Haiying Greedy clustering-anonymity method for privacy preservation of table data-publishing. (Chinese. English summary) Zbl 1389.68023 J. Softw. 28, No. 2, 341-351 (2017). MSC: 68P25 PDF BibTeX XML Cite \textit{H. Jiang} et al., J. Softw. 28, No. 2, 341--351 (2017; Zbl 1389.68023) Full Text: DOI
Kurosawa, Kaoru; Phong, Le Trieu Anonymous and leakage resilient IBE and IPE. (English) Zbl 1379.68118 Des. Codes Cryptography 85, No. 2, 273-298 (2017). MSC: 68P25 PDF BibTeX XML Cite \textit{K. Kurosawa} and \textit{L. T. Phong}, Des. Codes Cryptography 85, No. 2, 273--298 (2017; Zbl 1379.68118) Full Text: DOI
Cato, Susumu Unanimity, anonymity, and infinite population. (English) Zbl 1394.91123 J. Math. Econ. 71, 28-35 (2017). MSC: 91B14 91B15 PDF BibTeX XML Cite \textit{S. Cato}, J. Math. Econ. 71, 28--35 (2017; Zbl 1394.91123) Full Text: DOI
Saraswat, Vishal; Sahu, Rajeev Anand; Awasthi, Amit K. A secure anonymous proxy signcryption scheme. (English) Zbl 1364.94566 J. Math. Cryptol. 11, No. 2, 63-84 (2017). MSC: 94A60 94A62 68P25 PDF BibTeX XML Cite \textit{V. Saraswat} et al., J. Math. Cryptol. 11, No. 2, 63--84 (2017; Zbl 1364.94566) Full Text: DOI
Xie, Yuqin; Zheng, Mingchun A differentiated anonymity algorithm for social network privacy preservation. (English) Zbl 07042394 Algorithms (Basel) 9, No. 4, Paper No. 85, 12 p. (2016). MSC: 68 90 PDF BibTeX XML Cite \textit{Y. Xie} and \textit{M. Zheng}, Algorithms (Basel) 9, No. 4, Paper No. 85, 12 p. (2016; Zbl 07042394) Full Text: DOI
Wang, Ke; Wang, Peng; Fu, Ada Waichee; Wong, Raymond Chi-Wing Generalized bucketization scheme for flexible privacy settings. (English) Zbl 1398.68150 Inf. Sci. 348, 377-393 (2016). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{K. Wang} et al., Inf. Sci. 348, 377--393 (2016; Zbl 1398.68150) Full Text: DOI
Arribillaga, R. Pablo; Massó, Jordi Comparing generalized median voter schemes according to their manipulability. (English) Zbl 1395.91152 Theor. Econ. 11, No. 2, 547-586 (2016). MSC: 91B12 PDF BibTeX XML Cite \textit{R. P. Arribillaga} and \textit{J. Massó}, Theor. Econ. 11, No. 2, 547--586 (2016; Zbl 1395.91152) Full Text: DOI
Kelly, Jerry S.; Qi, Shaofang Characterizing plurality rule on a fixed population. (English) Zbl 1396.91148 Econ. Lett. 146, 39-41 (2016). MSC: 91B14 PDF BibTeX XML Cite \textit{J. S. Kelly} and \textit{S. Qi}, Econ. Lett. 146, 39--41 (2016; Zbl 1396.91148) Full Text: DOI
Trujillo-Rasua, Rolando; G. Yero, Ismael \(k\)-metric antidimension: a privacy measure for social graphs. (English) Zbl 1388.91138 Inf. Sci. 328, 403-417 (2016). MSC: 91D30 05C82 94A60 PDF BibTeX XML Cite \textit{R. Trujillo-Rasua} and \textit{I. G. Yero}, Inf. Sci. 328, 403--417 (2016; Zbl 1388.91138) Full Text: DOI arXiv
Tsukada, Yasuyuki; Sakurada, Hideki; Mano, Ken; Manabe, Yoshifumi On compositional reasoning about anonymity and privacy in epistemic logic. (English) Zbl 1403.03051 Ann. Math. Artif. Intell. 78, No. 2, 101-129 (2016). MSC: 03B70 03B42 68P25 68P30 68Q60 PDF BibTeX XML Cite \textit{Y. Tsukada} et al., Ann. Math. Artif. Intell. 78, No. 2, 101--129 (2016; Zbl 1403.03051) Full Text: DOI
Gong, Junqing; Dong, Xiaolei; Chen, Jie; Cao, Zhenfu Efficient IBE with tight reduction to standard assumption in the multi-challenge setting. (English) Zbl 1407.94111 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 624-654 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Gong} et al., Lect. Notes Comput. Sci. 10032, 624--654 (2016; Zbl 1407.94111) Full Text: DOI
Libert, Benoît; Ling, San; Mouhartem, Fabrice; Nguyen, Khoa; Wang, Huaxiong Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions. (English) Zbl 1407.94136 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 373-403 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Libert} et al., Lect. Notes Comput. Sci. 10032, 373--403 (2016; Zbl 1407.94136) Full Text: DOI
Libert, Benoît; Ling, San; Mouhartem, Fabrice; Nguyen, Khoa; Wang, Huaxiong Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption. (English) Zbl 1407.94135 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 101-131 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Libert} et al., Lect. Notes Comput. Sci. 10032, 101--131 (2016; Zbl 1407.94135) Full Text: DOI
Bubboloni, Daniela; Gori, Michele Resolute refinements of social choice correspondences. (English) Zbl 1397.91186 Math. Soc. Sci. 84, 37-49 (2016). MSC: 91B14 PDF BibTeX XML Cite \textit{D. Bubboloni} and \textit{M. Gori}, Math. Soc. Sci. 84, 37--49 (2016; Zbl 1397.91186) Full Text: DOI
Alemante, Fasil; Campbell, Donald E.; Kelly, Jerry S. Characterizing the resolute part of monotonic social choice correspondences. (English) Zbl 1367.91063 Econ. Theory 62, No. 4, 765-783 (2016). MSC: 91B14 91B12 PDF BibTeX XML Cite \textit{F. Alemante} et al., Econ. Theory 62, No. 4, 765--783 (2016; Zbl 1367.91063) Full Text: DOI
Jiang, Qi; Wei, Fushan; Fu, Shuai; Ma, Jianfeng; Li, Guangsong; Alelaiwi, Abdulhameed Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. (English) Zbl 1353.94080 Nonlinear Dyn. 83, No. 4, 2085-2101 (2016). MSC: 94A62 37D45 37N99 PDF BibTeX XML Cite \textit{Q. Jiang} et al., Nonlinear Dyn. 83, No. 4, 2085--2101 (2016; Zbl 1353.94080) Full Text: DOI
Driesen, Bram Truncated leximin solutions. (English) Zbl 1397.91033 Math. Soc. Sci. 83, 79-87 (2016). MSC: 91A12 PDF BibTeX XML Cite \textit{B. Driesen}, Math. Soc. Sci. 83, 79--87 (2016; Zbl 1397.91033) Full Text: DOI
Kobusińska, Anna; Brzeziński, Jerzy; Boroń, Michał; Inatlewski, Łukasz; Jabczyński, Michał; Maciejewski, Mateusz A branch hash function as a method of message synchronization in anonymous P2P conversations. (English) Zbl 1347.94004 Int. J. Appl. Math. Comput. Sci. 26, No. 2, 479-493 (2016). MSC: 94A05 94A62 PDF BibTeX XML Cite \textit{A. Kobusińska} et al., Int. J. Appl. Math. Comput. Sci. 26, No. 2, 479--493 (2016; Zbl 1347.94004) Full Text: DOI
Libert, Benoît; Mouhartem, Fabrice; Nguyen, Khoa A lattice-based group signature scheme with message-dependent opening. (English) Zbl 1346.94145 Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 137-155 (2016). MSC: 94A62 PDF BibTeX XML Cite \textit{B. Libert} et al., Lect. Notes Comput. Sci. 9696, 137--155 (2016; Zbl 1346.94145) Full Text: DOI
Lai, Jianchang; Mu, Yi; Guo, Fuchun; Susilo, Willy; Chen, Rongmao Anonymous identity-based broadcast encryption with revocation for file sharing. (English) Zbl 1346.94108 Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 223-239 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Lai} et al., Lect. Notes Comput. Sci. 9723, 223--239 (2016; Zbl 1346.94108) Full Text: DOI
He, Kai; Weng, Jian; Au, Man Ho; Mao, Yijun; Deng, Robert H. Generic anonymous identity-based broadcast encryption with chosen-ciphertext security. (English) Zbl 1346.94104 Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 207-222 (2016). MSC: 94A60 PDF BibTeX XML Cite \textit{K. He} et al., Lect. Notes Comput. Sci. 9723, 207--222 (2016; Zbl 1346.94104) Full Text: DOI
Krzywiecki, Łukasz Anonymous authentication scheme based on PUF. (English) Zbl 06582265 Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 359-372 (2016). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{Ł. Krzywiecki}, Lect. Notes Comput. Sci. 9558, 359--372 (2016; Zbl 06582265) Full Text: DOI
Salas, Julián; Torra, Vicenç Improving the characterization of P-stability for applications in network privacy. (English) Zbl 1342.68258 Discrete Appl. Math. 206, 109-114 (2016). MSC: 68R10 05C81 68W20 68W25 91D30 PDF BibTeX XML Cite \textit{J. Salas} and \textit{V. Torra}, Discrete Appl. Math. 206, 109--114 (2016; Zbl 1342.68258) Full Text: DOI
Jakobsen, Sune K.; Orlandi, Claudio How to bootstrap anonymous communication. (English) Zbl 1334.94082 Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 333-344 (2016). MSC: 94A60 68U10 PDF BibTeX XML Cite \textit{S. K. Jakobsen} and \textit{C. Orlandi}, in: Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS'16, Cambridge, MA, USA, January 14--16, 2016. New York, NY: Association for Computing Machinery (ACM). 333--344 (2016; Zbl 1334.94082) Full Text: DOI
Ikarashi, Dai; Kikuchi, Ryo; Chida, Koji; Takahashi, Katsumi \(k\)-anonymous microdata release via post randomisation method. (English) Zbl 1398.68138 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 225-241 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{D. Ikarashi} et al., Lect. Notes Comput. Sci. 9241, 225--241 (2015; Zbl 1398.68138) Full Text: DOI
Mori, Osamu Axiomatic theories of utilitarianism and weak utilitarianism. (English) Zbl 1396.91178 Econ. Lett. 137, 59-61 (2015). MSC: 91B16 PDF BibTeX XML Cite \textit{O. Mori}, Econ. Lett. 137, 59--61 (2015; Zbl 1396.91178) Full Text: DOI
Chen, Weien; Cao, Yongzhi; Wang, Hanpin Conditional anonymity with non-probabilistic adversary. (English) Zbl 1441.94072 Inf. Sci. 324, 32-43 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{W. Chen} et al., Inf. Sci. 324, 32--43 (2015; Zbl 1441.94072) Full Text: DOI
Wang, Ding; Wang, Nan; Wang, Ping; Qing, Sihan Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. (English) Zbl 1391.94807 Inf. Sci. 321, 162-178 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{D. Wang} et al., Inf. Sci. 321, 162--178 (2015; Zbl 1391.94807) Full Text: DOI
Fan, Chun-I; Tseng, Yi-Fan Anonymous multi-receiver identity-based authenticated encryption with CCA security. (English) Zbl 1418.94046 Symmetry 7, No. 4, 1856-1881 (2015). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{C.-I Fan} and \textit{Y.-F. Tseng}, Symmetry 7, No. 4, 1856--1881 (2015; Zbl 1418.94046) Full Text: DOI
Campbell, Donald E.; Kelly, Jerry S. The finer structure of resolute, neutral, and anonymous social choice correspondences. (English) Zbl 1364.91049 Econ. Lett. 132, 109-111 (2015). MSC: 91B14 PDF BibTeX XML Cite \textit{D. E. Campbell} and \textit{J. S. Kelly}, Econ. Lett. 132, 109--111 (2015; Zbl 1364.91049) Full Text: DOI
Ghosh, Satrajit; Kate, Aniket Post-quantum forward-secure onion routing (future anonymity in today’s budget). (English) Zbl 06553587 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-28165-0/pbk; 978-3-319-28166-7/ebook). Lecture Notes in Computer Science 9092, 263-286 (2015). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{S. Ghosh} and \textit{A. Kate}, Lect. Notes Comput. Sci. 9092, 263--286 (2015; Zbl 06553587) Full Text: DOI
Mhamdi, Tarek; Hasan, Osman; Tahar, Sofiène Evaluation of anonymity and confidentiality protocols using theorem proving. (English) Zbl 1331.68028 Form. Methods Syst. Des. 47, No. 3, 265-286 (2015). MSC: 68M12 68P25 68T15 94A15 PDF BibTeX XML Cite \textit{T. Mhamdi} et al., Form. Methods Syst. Des. 47, No. 3, 265--286 (2015; Zbl 1331.68028) Full Text: DOI
Ma, Tinghuai; Zhang, Yuliang; Cao, Jie; Shen, Jian; Tang, Meili; Tian, Yuan; Al-Dhelaan, Abdullah; Al-Rodhaan, Mznah KDVEM: a \(k\)-degree anonymity with vertex and edge modification algorithm. (English) Zbl 1329.91116 Computing 97, No. 12, 1165-1184 (2015). MSC: 91D30 68R10 PDF BibTeX XML Cite \textit{T. Ma} et al., Computing 97, No. 12, 1165--1184 (2015; Zbl 1329.91116) Full Text: DOI
Mackenzie, Andrew Symmetry and impartial lotteries. (English) Zbl 1347.91133 Games Econ. Behav. 94, 15-28 (2015). MSC: 91B14 91B12 PDF BibTeX XML Cite \textit{A. Mackenzie}, Games Econ. Behav. 94, 15--28 (2015; Zbl 1347.91133) Full Text: DOI