{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:12:55Z","timestamp":1747282375225,"version":"3.40.5"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319144382"},{"type":"electronic","value":"9783319144399"}],"license":[{"start":{"date-parts":[[2014,12,21]],"date-time":"2014-12-21T00:00:00Z","timestamp":1419120000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,21]],"date-time":"2014-12-21T00:00:00Z","timestamp":1419120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14439-9_4","type":"book-chapter","created":{"date-parts":[[2014,12,20]],"date-time":"2014-12-20T13:59:49Z","timestamp":1419083989000},"page":"109-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparison of Mechanisms"],"prefix":"10.1007","author":[{"given":"Michael \u00d8stergaard","family":"Pedersen","sequence":"first","affiliation":[]},{"given":"Gert L\u00e6ss\u00f8e","family":"Mikkelsen","sequence":"additional","affiliation":[]},{"given":"Fatbardh","family":"Veseli","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Sabouri","sequence":"additional","affiliation":[]},{"given":"Tsvetoslava","family":"Vateva-Gurova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,21]]},"reference":[{"key":"4_CR1","unstructured":"Andr\u00e9 \u00c5rnes, Mike Just, Svein J Knapskog, Steve Lloyd, and Henk Meijer. Selecting Revocation Solutions for PKI, 2000."},{"key":"4_CR2","unstructured":"Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Janus Dam Nielsen, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm. Architecture for Attribute-based Credential Technologies - Final Version. Deliverable D2.2, The ABC4Trust EU Project, 2014. Available at https:\/\/abc4trust.eu\/download\/Deliverable_D2.2.pdf, Last accessed on 2014-11-08."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, and Anna Lysyanskaya. P-signatures and Noninteractive Anonymous Credentials. In Theory of Cryptography, volume 4948, pages 356\u2013374. Springer, 2008.","DOI":"10.1007\/978-3-540-78524-8_20"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Foteini Baldimtsi and Anna Lysyanskaya. Anonymous credentials light. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 1087\u20131098. ACM, 2013.","DOI":"10.1145\/2508859.2516687"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Stefan A Brands. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. In IDMAN, volume 396, pages 34\u201352. Springer, 2013.","DOI":"10.1007\/978-3-642-37282-7_4"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Anna Lysyanskaya. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In Advances in Cryptology, pages 61\u201376. Springer, 2002.","DOI":"10.1007\/3-540-45708-9_5"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Anna Lysyanskaya. A Signature Scheme with Efficient Protocols. In Proceedings of the 3rd International Conference on Security in Communication Networks, pages 268\u2013289. Springer, 2003.","DOI":"10.1007\/3-540-36413-7_20"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Jesus Luna Garcia, Robert Langenberg, and Neeraj Suri. Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees. In CCSW, pages 103\u2013112. ACM, 2012.","DOI":"10.1145\/2381913.2381932"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Jesus Luna, Hamza Ghani, Tsvetoslava Vateva, and Neeraj Suri. Quantitative Assessment of Cloud Security Level Agreements: A Case Study. In SECRYPT, pages 64\u201373. SciTePress, 2012.","DOI":"10.5220\/0004019900640073"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Jorn Lapon, Markulf Kohlweiss, Bart De Decker, and Vincent Naessens. Performance Analysis of Accumulator-Based Revocation Mechanisms. In SEC, volume 330, pages 289\u2013301. Springer, 2010.","DOI":"10.1007\/978-3-642-15257-3_26"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Jorn Lapon, Markulf Kohlweiss, Bart De Decker, and Vincent Naessens. Analysis of Revocation Strategies for Anonymous Idemix Credentials. In Communications and Multimedia Security, volume 7025, pages 3\u201317. Springer, 2011.","DOI":"10.1007\/978-3-642-24712-5_1"},{"key":"4_CR13","unstructured":"Jiangtao Li, Ninghui Li, and Rui Xue. Universal accumulators with efficient nonmembership proofs. 2007."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Wojciech Mostowski and Pim Vullers. Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. In SecureComm, volume 96, pages 243\u2013260. Springer, 2011.","DOI":"10.1007\/978-3-642-31909-9_14"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Pierre Parrend and St\u00e9phane Fr\u00e9not. Security benchmarks of OSGi platforms: toward Hardened OSGi. Softw., Pract. Exper., 39(5):471\u2013499, 2009.","DOI":"10.1002\/spe.906"},{"key":"4_CR16","unstructured":"Christian Paquin and Greg Zaverucha. U-prove Cryptographic Specification v1.1 (Revision 2). Technical report, Microsoft Corporation, 2013."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Claus-Peter Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161\u2013174, 1991.","DOI":"10.1007\/BF00196725"},{"key":"4_CR18","unstructured":"Nigel Smart. ECRYPT II yearly report on algorithms and keysizes (2011-2012). www.ecrypt.eu.org\/documents\/D.SPA.20.pdf, 2012."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Pim Vullers and Gergely Alp\u00e1r. Efficient Selective Disclosure on Smart Cards Using Idemix. In IDMAN, volume 396, pages 53\u201367. Springer, 2013.","DOI":"10.1007\/978-3-642-37282-7_5"}],"container-title":["Attribute-based Credentials for Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14439-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T16:56:28Z","timestamp":1747241788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14439-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,21]]},"ISBN":["9783319144382","9783319144399"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14439-9_4","relation":{},"subject":[],"published":{"date-parts":[[2014,12,21]]},"assertion":[{"value":"21 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}