T. Lorünser, S. Krenn, C. Striecks, and T. Länger, Agile Cryptographic Solutions for the Cloud, e&i Elektrotechnik und Informationstechnik, 2017.

A. Alaqra, S. Fischer-hübner, T. Groß, T. Lorünser, and D. Slamanig, Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements, Privacy and Identity Management, vol.476, pp.79-96, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01619744

F. Karegar, C. Striecks, S. Krenn, F. Hörandner, T. Lorünser et al., Opportunities and Challenges of CREDENTIAL-Towards a Metadata-Privacy Respecting Identity Provider, Privacy and Identity Management, vol.498, pp.76-91, 2016.

, ISO/IEC: ISO/IEC 24760: A Framework for Identity Management-Part 1: Terminology and Concepts, Part 2: Reference Framework and Requirements, vol.3, 2011.

K. Rannenberg, J. Camenisch, and A. Sabouri, Attribute-based Credentials for Trust: Identity in the Information Society, 2015.

F. Hörandner, S. Krenn, A. Migliavacca, F. Thiemer, and B. Zwattendorfer, CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing, ARES 2016, pp.742-749, 2016.

A. Kostopoulos, E. Sfakianakis, I. P. Chochliouros, J. S. Pettersson, S. Krenn et al., Towards the Adoption of Secure Cloud Identity Services, ARES 2017, vol.90, pp.1-90, 2017.

R. Johnson, D. Molnar, D. Song, and D. Wagner, Homomorphic Signature Schemes, LNCS, vol.2271, pp.244-262, 2002.

M. Blaze, G. Bleumer, and M. Strauss, Divertible Protocols and Atomic Proxy Cryptography, EUROCRYPT 98, vol.1403, pp.127-144, 1998.

D. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Commun. ACM, vol.24, pp.84-88, 1981.

D. Chaum, Security Without Identification: Transaction Systems to Make Big Brother Obsolete, Commun. ACM, vol.28, pp.1030-1044, 1985.

J. Camenisch, S. Krenn, A. Lehmann, G. L. Mikkelsen, G. Neven et al., Formal Treatment of Privacy-Enhancing Credential Systems, SAC 2015, vol.9566, pp.3-24, 2015.

S. Krenn, T. Lorünser, A. Salzer, and C. Striecks, Towards Attribute-Based Credentials in the Cloud, Cryptology and Network Security-CANS 2017, 2017.

T. Lorünser, C. Rodriguez, D. Demirel, S. Fischer-hübner, T. Groß et al., Towards a New Paradigm for Privacy and Security in Cloud Services, Cyber Security and Privacy, vol.530, pp.14-25, 2015.

T. Lorünser, T. Länger, and D. Slamanig, Cloud Security and Privacy by Design, E-Democracy Citizen Rights in the World of the New Computing Paradigms, vol.570, pp.202-206, 2015.

T. Lorünser, D. Slamanig, T. Länger, and H. C. Pöhls, PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In: 11th International Conference on Availability, Reliability and Security, pp.733-741, 2016.

A. Shamir, How to Share a Secret, Communications of the ACM, 1979.

G. R. Blakley, Safeguarding cryptographic keys, AFIPS National Computer Conference, 1979.

J. H. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, A. Shelat et al., Computing on Authenticated Data, TCC 2012, vol.7194, pp.1-20, 2012.

S. Haber, Y. Hatano, Y. Honda, W. G. Horne, K. Miyazaki et al., Efficient Signature Schemes Supporting Redaction, Pseudonymization, and Data Deidentification, ASIACCS 08, pp.353-362, 2008.

J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin et al., Chameleon-Hashes with Ephemeral Trapdoors-And Applications to Invisible Sanitizable Signatures, Part II, vol.10175, pp.152-182, 2017.

T. Groß, Efficient certification and zero-knowledge proofs of knowledge on infrastructure topology graphs, vol.14, pp.69-80, 2014.

D. Derler and D. Slamanig, Fully-anonymous short dynamic group signatures without encryption. IACR Cryptology ePrint Archive, p.154, 2016.

S. Krenn, T. Lorünser, and C. Striecks, Batch-verifiable Secret Sharing with Unconditional Privacy, Proceedings of the 3rd International Conference on Information Systems Security and Privacy, vol.1, pp.303-311, 2017.

D. Demirel, S. Krenn, T. Lorünser, and G. Traverso, Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System, 11th International Conference on Availability, Reliability and Security, pp.88-97, 2016.

T. Lorünser, E. Querasser, T. Matyus, M. Peev, J. Wolkerstorfer et al., Security processor with quantum key distribution, Application-Specific Systems, Architectures and Processors, pp.37-42, 2008.

A. Neppach, C. Pfaffel-janser, I. Wimberger, T. Lorünser, M. Meyenburg et al., Key management of quantum generated keys in IPSEC, SECRYPT 2008-International Conference on Security and Cryptography, pp.177-183, 2008.

A. Happe, S. Krenn, and T. Lorünser, In: Malicious Clients in Distributed Secret Sharing Based Storage Networks, pp.206-214, 2017.

A. Happe, F. Wohner, and T. Lorünser, The Archistar Secret-Sharing Backup Proxy, Proceedings of the 12th International Conference on Availability, Reliability and Security. ARES '17, vol.88, pp.1-88, 2017.

T. Lorünser, A. Happe, and D. Slamanig, ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing, Cloud Computing Technology and Science (CloudCom), pp.371-378, 2015.

S. Bleikertz, T. Groß, M. Schunter, and K. Eriksson, Automated Information Flow Analysis of Virtualized Infrastructures, ESORICS 11, 2011.

S. Bleikertz, C. Vogel, and T. Groß, Cloud Radar: near real-time detection of security failures in dynamic virtualized infrastructures, ACSAC, vol.14, pp.26-35, 2014.

S. Bleikertz, C. Vogel, T. Groß, and S. Mödersheim, Proactive security analysis of changes in virtualized infrastructures, ACSAC 15, 2015.

T. Groß, Signatures and efficient proofs on committed graphs and NP-statements, FC 15, pp.293-314, 2015.

J. Camenisch and A. Lysyanskaya, A signature scheme with efficient protocols, SCN 2002, vol.2576, pp.268-289, 2003.

J. Camenisch and T. Groß, Efficient attributes for anonymous credentials, ACM CCS, pp.345-356, 2008.

J. Camenisch and T. Groß, Efficient attributes for anonymous credentials, TISSEC, vol.15, p.30, 2012.

T. Groß, Geo-location separation of virtualized systems, 2017.