Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats

Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak. Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats. In Joseph K. Liu, Ron Steinfeld, editors, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II. Volume 9723 of Lecture Notes in Computer Science, pages 467-477, Springer, 2016. [doi]

@inproceedings{KutylowskiHK16,
  title = {Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats},
  author = {Miroslaw Kutylowski and Lucjan Hanzlik and Kamil Kluczniak},
  year = {2016},
  doi = {10.1007/978-3-319-40367-0_31},
  url = {http://dx.doi.org/10.1007/978-3-319-40367-0_31},
  researchr = {https://researchr.org/publication/KutylowskiHK16},
  cites = {0},
  citedby = {0},
  pages = {467-477},
  booktitle = {Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II},
  editor = {Joseph K. Liu and Ron Steinfeld},
  volume = {9723},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-40366-3},
}