Anonymity for Key-Trees with Adaptive Adversaries

Michael Beye, Thijs Veugen. Anonymity for Key-Trees with Adaptive Adversaries. In Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis, editors, Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Volume 96 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 409-425, Springer, 2011. [doi]

@inproceedings{BeyeV11,
  title = {Anonymity for Key-Trees with Adaptive Adversaries},
  author = {Michael Beye and Thijs Veugen},
  year = {2011},
  doi = {10.1007/978-3-642-31909-9_23},
  url = {http://dx.doi.org/10.1007/978-3-642-31909-9_23},
  researchr = {https://researchr.org/publication/BeyeV11},
  cites = {0},
  citedby = {0},
  pages = {409-425},
  booktitle = {Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers},
  editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis},
  volume = {96},
  series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
  publisher = {Springer},
  isbn = {978-3-642-31908-2},
}