How to win the clonewars: Efficient periodic n-times anonymous authenticationJan CamenischSusan Hohenbergeret al.2006CCS 2006
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME ProjectClaudio A. ArdagnaJan Camenischet al.2010Journal of Computer Security