Abuse-Resistant Pseudonymization and Pseudonym Change without Trusted Third Parties
Autor: M. Florian, J. Walter, I. Baumgart Links:
Quelle: 8. ITG FG 5.2.2 Workshop "Neue Herausforderungen in der Netzsicherheit" (ITG-NHNS), Tübingen, Germany, September 2015