Pseudonym Systems

Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf. Pseudonym Systems. In Howard M. Heys, Carlisle M. Adams, editors, Selected Areas in Cryptography, 6th Annual International Workshop, SAC 99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings. Volume 1758 of Lecture Notes in Computer Science, pages 184-199, Springer, 1999. [doi]

@inproceedings{LysyanskayaRSW99,
  title = {Pseudonym Systems},
  author = {Anna Lysyanskaya and Ronald L. Rivest and Amit Sahai and Stefan Wolf},
  year = {1999},
  url = {http://link.springer.de/link/service/series/0558/bibs/1758/17580184.htm},
  researchr = {https://researchr.org/publication/LysyanskayaRSW99},
  cites = {0},
  citedby = {0},
  pages = {184-199},
  booktitle = {Selected Areas in Cryptography, 6th Annual International Workshop, SAC 99, Kingston, Ontario, Canada, August 9-10, 1999,  Proceedings},
  editor = {Howard M. Heys and Carlisle M. Adams},
  volume = {1758},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-67185-4},
}