Method of providing digital signatures. https://www.google.com, p.4309569, 1979. ,
Bitcoin: A peer-to-peer electronic cash system, 2008. ,
Blockchain: Blueprint for a new economy, 2015. ,
Decentralizing Privacy: Using Blockchain to Protect Personal Data, 2015 IEEE Security and Privacy Workshops, pp.180-184, 2015. ,
DOI : 10.1109/SPW.2015.27
PPM: Privacy Policy Manager for Personalized Services, Security Engineering and Intelligence Informatics, pp.377-392, 2013. ,
DOI : 10.1007/978-3-642-40588-4_26
URL : https://hal.archives-ouvertes.fr/hal-01506558
oneM2M Architecture Based User Centric IoT Application Development, 2015 3rd International Conference on Future Internet of Things and Cloud, pp.100-107, 2015. ,
DOI : 10.1109/FiCloud.2015.7
URL : https://hal.archives-ouvertes.fr/hal-01206791
Sanitizable Signatures, European Symposium on Research in Computer Security, pp.159-177, 2005. ,
DOI : 10.1007/11555827_10
Invisibly Sanitizable Digital Signature Scheme, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.91, issue.1, pp.392-402, 2008. ,
DOI : 10.1093/ietfec/e91-a.1.392
Security of Sanitizable Signatures Revisited, pp.317-336, 2009. ,
DOI : 10.1007/978-3-540-30598-9_12
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, International Conference on the Theory and Applications of Cryptographic Techniques, pp.416-432, 2003. ,
DOI : 10.1007/3-540-39200-9_26
URL : http://eprint.iacr.org/2002/175.ps.gz
Attribute-based encryption for finegrained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security, pp.89-98, 2006. ,
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments, International Conference on Ubiquitous Computing, pp.73-90, 2007. ,
DOI : 10.1007/978-3-540-74853-3_5
URL : http://www.isg.rhul.ac.uk/~cjm/nnibpp.pdf