C. Paquin and G. Zaverucha, U-prove Cryptographic Specification v1, 2013.

P. Bichsel, C. Binding, J. Camenisch, T. Gro, T. Heydt-benjamin et al., Cryptographic Protocols of the Identity Mixer Library, IBM Research GmbH, 2008.

J. Camenisch and A. Lysyanskaya, A Signature Scheme with Efficient Protocols, Proceedings of the 3rd International Conference on Security in Communication Networks, pp.268-289, 2003.
DOI : 10.1007/3-540-36413-7_20

S. A. Brands, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000.

P. Vullers and G. Alpar, Efficient Selective Disclosure on Smart Cards Using Idemix, In: IDMAN, vol.396, pp.53-67, 2013.
DOI : 10.1007/978-3-642-37282-7_5

URL : https://hal.archives-ouvertes.fr/hal-01470503

W. Mostowski and P. Vullers, Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards, In: SecureComm, vol.28, pp.243-260, 2011.
DOI : 10.1007/3-540-45682-1_31

C. P. Schnorr, Efficient signature generation by smart cards, Journal of Cryptology, vol.4, issue.3, pp.161-174, 1991.
DOI : 10.1007/BF00196725

J. Lapon, M. Kohlweiss, B. Decker, and V. Naessens, Performance Analysis of Accumulator-Based Revocation Mechanisms, In: SEC, vol.28, issue.10, pp.289-301, 2010.
DOI : 10.1007/11761679_1

URL : https://hal.archives-ouvertes.fr/hal-01054508

J. Camenisch and A. Lysyanskaya, Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials, In: Advances in Cryptology, pp.61-76, 2002.
DOI : 10.1007/3-540-45708-9_5

M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya, P-signatures and Noninteractive Anonymous Credentials, Theory of Cryptography, pp.356-374, 2008.
DOI : 10.1007/978-3-540-78524-8_20

J. Li, N. Li, and R. Xue, Universal Accumulators with Efficient Nonmembership Proofs, 2007.
DOI : 10.1007/978-3-540-72738-5_17

J. Lapon, M. Kohlweiss, B. Decker, and V. Naessens, Analysis of Revocation Strategies for Anonymous Idemix Credentials, Communications and Multimedia Security, pp.3-17, 2011.
DOI : 10.1007/978-3-642-24712-5_1

J. Luna, R. Langenberg, and N. Suri, Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees, pp.103-112, 2012.

J. Luna, H. Ghani, T. Vateva, and N. Suri, Quantitative Assessment of Cloud Security Level Agreements: A Case Study, pp.64-73, 2012.

P. Parrend and S. Frenot, Security benchmarks of OSGi platforms: toward Hardened OSGi, Software: Practice and Experience, vol.22, issue.5, pp.471-499, 2009.
DOI : 10.1002/spe.906

J. Camenisch, M. Dubovitskaya, A. Lehmann, G. Neven, C. Paquin et al., Concepts and Languages for Privacy-Preserving Attribute-Based Authentication, In: IDMAN, vol.396, pp.34-52, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01470502