Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
7
views
14
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,998
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Key Cryptography
Marking: A Privacy Protecting Approach Against Blackmailing
other
Author(s):
Dennis Kügler
,
Holger Vogt
Publication date
(Online):
June 05 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Most cited references
14
Record
: found
Abstract
: not found
Book Chapter
: not found
Blind Signatures for Untraceable Payments
David Chaum
(1983)
0
comments
Cited
152
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Witness indistinguishable and witness hiding protocols
U Feige
,
A Shamir
(1990)
0
comments
Cited
66
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
Tatsuaki Okamoto
(1993)
0
comments
Cited
58
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2001
Publication date (Online):
June 05 2001
Pages
: 137-152
DOI:
10.1007/3-540-44586-2_10
SO-VID:
8a388b15-e373-4e55-b77b-6d8c96be2750
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 137
Marking: A Privacy Protecting Approach Against Blackmailing
pp. 19
Semantically Secure McEliece Public-Key Cryptosystems -Conversions for McEliece PKC -
pp. 190
Efficient Revocation in Group Signatures
pp. 207
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
pp. 317
Remarks on Mix-Network Based on Permutation Networks
Similar content
2,998
Between Moral Blackmail and Moral Risk
Authors:
Itamar Mann
Computers and the blackmail threat
Authors:
Martin Wasik
Argentina A Blackmailed Democracy
Authors:
I. CHERESKY
See all similar
Cited by
2
Offline Payments with Auditable Tracing
Authors:
Dennis Kügler
,
Holger Vogt
Fair Tracing Without Trustees for Multiple Banks
Authors:
Chen Min Lin
,
Xiaoqin Huang
,
Jinyuan You
See all cited by