The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for untraceability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-1999 (15) 2001-2005 (17) 2006-2007 (16) 2008-2010 (16) 2011-2020 (16) 2021-2024 (5)
Publication types (Num. hits)
article(27) incollection(3) inproceedings(55)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 86 occurrences of 48 keywords

Results
Found 85 publication records. Showing 85 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
106Chae Hoon Lim, Taekyoung Kwon 0002 Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
86Ton van Deursen, Sjouke Mauw, Sasa Radomirovic Untraceability of RFID Protocols. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID protocols, formal verification, untraceability
86Rafal Leszczyna, Janusz Górski Performance analysis of untraceability protocols for mobile agents using an adaptable framework. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, performance evaluation, privacy, mobile agents, anonymity, security protocols, ACM proceedings, untraceability
68Rafal Leszczyna, Janusz Górski Untraceability of mobile agents. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, privacy, mobile agents, anonymity, security protocols, ACM proceedings, untraceability
62Michael Waidner, Birgit Pfitzmann The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
53Rafal Leszczyna Anonymity Architecture for Mobile Agent Systems. Search on Bibsonomy HoloMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Youngjoon Seo, Hyunrok Lee, Kwangjo Kim A Scalable and Untraceable Authentication Protocol for RFID. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
51Sherin M. Moussa, Mohamed Hashem, Gul Agha An agent-based framework for inhabitants' untraceability in ubiquitous environments. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF agent-based ubiquitous applications, simulation tool for evaluation, mobile agents, smart spaces, untraceability
44Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy, Authentication, RFID, Anonymous
42Khaled Ouafi, Raphael C.-W. Phan Traceable Privacy of Recent Provably-Secure RFID Protocols. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, RFID, Authentication protocols, Untraceability
42Khaled Ouafi, Raphael C.-W. Phan Privacy of Recent RFID Authentication Protocols. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, RFID, provably secure, authentication protocols, untraceability
42Lin-Chuan Wu Analysis of traceability attack on Camenisch et al.'s blind signature schemes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, digital signature, information security, blind signature, untraceability
35Feng Bao 0001 Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Oleksandr Kurbatov, Dmytro Zakharov, Anton Levochko, Kyrylo Riabov, Bohdan Skriabin Multichain Taprootized Atomic Swaps: Introducing Untraceability through Zero-Knowledge Proofs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Hiral S. Trivedi, Sankita J. Patel Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Anil Kumar Sutrala, Mohammad S. Obaidat, Sourav Saha 0002, Ashok Kumar Das, Mamoun Alazab, Youngho Park 0005 Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Prasanta Kumar Roy, Ansuman Bhattacharya Secure and efficient authentication protocol with user untraceability for global roaming services. Search on Bibsonomy Wirel. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Sina Aeeneh, João Otávio Massari Chervinski, Jiangshan Yu, Nikola Zlatanov New Attacks on the Untraceability of Transactions in CryptoNote-Style Blockchains. Search on Bibsonomy IEEE ICBC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26An Braeken, Abdellah Touhafi Efficient Mobile User Authentication Service with Privacy Preservation and User Untraceability. Search on Bibsonomy Cloudtech The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Weijian Zhang, Chao Lin, Zhuo Lyu, Chen Cen, Min Luo An Efficient Blind Signature Scheme with Untraceability for Data Privacy in Smart Grid. Search on Bibsonomy SpaCCS Workshops The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Lynn Batten, Xun Yi Off-line digital cash schemes providing untraceability, anonymity and change. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Marko Kompara, SK Hafizul Islam, Marko Hölbl A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs. Search on Bibsonomy Comput. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo Re-thinking untraceability in the CryptoNote-style blockchain. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
26Swati Rawal, Sahadeo Padhye Untraceability of Partial Blind and Blind Signature Schemes. Search on Bibsonomy Inscrypt The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo Re-Thinking Untraceability in the CryptoNote-Style Blockchain. Search on Bibsonomy CSF The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Yangguang Tian, Yingjiu Li, Binanda Sengupta, Robert Huijie Deng, Albert Ching, Weiwei Liu 0005 Privacy-Preserving Remote User Authentication with k-Times Untraceability. Search on Bibsonomy Inscrypt The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Niranchana Radhakrishnan, Marimuthu Karuppiah, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan Security on "A Lightweight Authentication Scheme with User Untraceability". Search on Bibsonomy SpaCCS Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Hai-Duong Le, Ngoc-Tu Nguyen 0003, Chin-Chen Chang 0001 Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2016 DBLP  BibTeX  RDF
26Xu Yang 0002, Xinyi Huang 0001, Joseph K. Liu Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Kuo-Hui Yeh A lightweight authentication scheme with user untraceability. Search on Bibsonomy Frontiers Inf. Technol. Electron. Eng. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Gildas Avoine, Iwen Coisel, Tania Martin Untraceability Model for RFID. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Jin Wang 0009, Kejie Lu, Jianping Wang 0001, Chunming Qiao Untraceability of mobile devices in wireless mesh networks using linear network coding. Search on Bibsonomy INFOCOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Chin-Chen Chang 0001, Hai-Duong Le, Ching-Hsiang Chang Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability. Search on Bibsonomy AsiaJCIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Gerrit Bleumer Untraceability. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Yong Ki Lee, Lejla Batina, Dave Singelée, Bart Preneel, Ingrid Verbauwhede Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. Search on Bibsonomy Towards Hardware-Intrinsic Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Mete Akgün, Mehmet Ufuk Çaglayan Extending an RFID Security and Privacy Model by Considering Forward Untraceability. Search on Bibsonomy STM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Sébastien Canard, Amandine Jambert Untraceability and Profiling Are Not Mutually Exclusive. Search on Bibsonomy TrustBus The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Hung-Yu Chien, Chi-Sung Laih ECC-based lightweight authentication protocol with untraceability for low-cost RFID. Search on Bibsonomy J. Parallel Distributed Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. Search on Bibsonomy Security and Management The full citation details ... 2009 DBLP  BibTeX  RDF
26Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan 0001 Untraceability in the applied pi-calculus. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Jiang Wu 0001, Douglas R. Stinson How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
26Soon-Seok Kim Mobile Terminated Protocol to Remote Domain Considering User Location Untraceability Service. Search on Bibsonomy J. Inform. and Commun. Convergence Engineering The full citation details ... 2007 DBLP  BibTeX  RDF
26Andre Barroso, Hans-Jürgen Reumerman An Addressing Scheme to Support Untraceability in Mobile Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Gerrit Bleumer Untraceability. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Cheng-Chi Lee, Min-Shiang Hwang, Wei-Pang Yang A new blind signature based on the discrete logarithm problem for untraceability. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Ting Wu 0001, Jin-Rong Wang Comment: A new blind signature based on the discrete logarithm problem for untraceability. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Zhengjun Cao Untraceability of Two Group Signature Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
26Carlos Aguilar Melchor, Yves Deswarte pMIX: Untraceability for Small Hiding Groups. Search on Bibsonomy NCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Chang-Seop Park Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems. Search on Bibsonomy Comput. Networks The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Zhengjun Cao, Lihua Liu Untraceability of Wang-Fu Group Signature Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
26Akira Otsuka, Goichiro Hanaoka, Junji Shikata, Hideki Imai An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2002 DBLP  BibTeX  RDF
26Mark Borning, Dogan Kesdogan, Otto Spaniol Anonymität und Unbeobachtbarkeit im Internet (Anonymity and Untraceability in the Internet). Search on Bibsonomy Informationstechnik Tech. Inform. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Didier Samfat, Refik Molva, N. Asokan Untraceability in Mobile Networks. Search on Bibsonomy MobiCom The full citation details ... 1995 DBLP  DOI  BibTeX  RDF CDPD, alias, security, mobility, authentication, anonymity, GSM, location privacy
26Masahiro Mambo, Hirotsugu Kinoshita, Shigeo Tsujii Communication protocols with untraceability of sender and receiver. Search on Bibsonomy Syst. Comput. Jpn. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
26Michael Waidner Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26David Chaum The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Search on Bibsonomy J. Cryptol. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
24Aniello Castiglione, Roberto De Prisco, Alfredo De Santis Do You Trust Your Phone? Search on Bibsonomy EC-Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SMS security, mobile malware, telephone phishing, telephone pharming, caller ID spoofing, SMS spoofing, NGN, identity theft, untraceability, VoIP security
24Jiejun Kong, Xiaoyan Hong ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. Search on Bibsonomy MobiHoc The full citation details ... 2003 DBLP  DOI  BibTeX  RDF trapdoor, mobile ad-hoc network, broadcast, anonymity, pseudonymity, on-demand routing, untraceability
24Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. Search on Bibsonomy J. Cryptol. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Divertibility, Subliminal-free, Cryptographic protocols, Identification, Zero-knowledge, Proof systems, Untraceability
24Josep Domingo-Ferrer, Jordi Herrera-Joancomartí An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents. Search on Bibsonomy SIGMOD Rec. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF security and electronic payment, anonymity, electronic commerce, intelligent agents, untraceability
24Hideki Imai Information Security Aspects of Spread Spectrum Systems. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Spread Spectrum System, Information Security, CDMA, Jamming, Cellular System, Untraceability
18Huixian Li, Liaojun Pang A Novel Biometric-Based Authentication Scheme with Privacy Protection. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Ton van Deursen, Sasa Radomirovic Algebraic Attacks on RFID Protocols. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, Formal verification, security protocols, attacks, algebraic methods
18Xiangxi Li, Yu Zhang, Yuxin Deng Verifying Anonymous Credential Systems in Applied Pi Calculus. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Guomin Yang, Duncan S. Wong, Xiaotie Deng Anonymous and Authenticated Key Exchange for Roaming Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Zhengqin Luo, Xiaojuan Cai, Jun Pang 0001, Yuxin Deng Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Stefan Brands, Liesje Demuynck, Bart De Decker A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Karim M. El Defrawy, Gene Tsudik ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Marina Blanton, Mikhail J. Atallah Succinct representation of flexible and privacy-preserving access rights. Search on Bibsonomy VLDB J. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy-preserving access rights, Flexible access rights, Compact representation
18Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger Solving Bao's Colluding Attack in Wang's Fair Payment Protocol. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18JaeCheol Ha, JungHoon Ha, Sang-Jae Moon, Colin Boyd LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. Search on Bibsonomy ICUCT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Desynchronization attack, Privacy, Traceability, Mutual authentication, RFID system
18Giuseppe Ciaccio Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong Recoverable and Untraceable E-Cash. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Untraceable, E-Cash, Recoverable
18Ramsés Morales, Indranil Gupta Providing both scale and security through a single core probabilistic protocol. Search on Bibsonomy CollaborateCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Mark Manulis, Jörg Schwenk Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Laurent Bussard, Refik Molva Establishing Trust with Privacy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Chih-Hung Wang Untraceable Fair Network Payment Protocols with Off-Line TTP. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Designated Confirmer Signatures, Cryptography, Electronic Commerce, Undeniable Signature, Electronic cash, Payment System
18Chun-I Fan, Chin-Laung Lei Secure Rewarding Schemes. Search on Bibsonomy HICSS (3) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
18Birgit Pfitzmann, Matthias Schunter, Michael Waidner How to Break Another Provably Secure Payment System. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
18Stefan Brands Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
18Birgit Pfitzmann, Michael Waidner How To Break and Repair A "Provably Secure" Untraceable Payment System. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
18Jurjen N. Bos, Bert den Boer Detection of Disrupters in the DC Protocol. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
18Tatsuaki Okamoto, Kazuo Ohta Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #85 of 85 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license