Abuse-Resistant Pseudonymization and Pseudonym Change without Trusted Third Parties
Author: M. Florian, J. Walter, I. Baumgart links:
Source: 8. ITG FG 5.2.2 Workshop "Neue Herausforderungen in der Netzsicherheit" (ITG-NHNS), Tübingen, Germany, September 2015