Patrik Bichsel
Patrik Bichsel
Privacy Researcher, IBM Research - Zurich
Verified email at - Homepage
Cited by
Cited by
Anonymous credentials on a standard java card
P Bichsel, J Camenisch, T Groß, V Shoup
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Get shorty via group signatures without encryption
P Bichsel, J Camenisch, G Neven, NP Smart, B Warinschi
International Conference on Security and Cryptography for Networks, 381-398, 2010
Cryptographic protocols of the identity mixer library
P Bichsel, C Binding, J Camenisch, T Groß, T Heydt-Benjamin, D Sommer, ...
Tech. Rep. RZ 3730, Tech. Rep., 2009
D2. 2 Architecture for attribute-based credential technologies-final version
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, I Krontiris, ...
ABC4TRUST project deliverable. Available online at https://abc4trust. eu …, 2014
A comprehensive framework enabling data-minimizing authentication
P Bichsel, J Camenisch, FS Preiss
Proceedings of the 7th ACM workshop on Digital identity management, 13-22, 2011
Theft and misuse protection for anonymous credentials
P Bichsel
Master's thesis, ETH Zürich, Switzerland, 2007
An architecture for privacy-ABCs
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, S Krenn, ...
Attribute-Based Credentials for Trust, 11-78, 2015
Set definition in data processing systems
P Bichsel, FS Preiss, M Verdicchio
US Patent App. 12/924,600, 2011
Transaction auditing for data security devices
P Bichsel, JL Camenisch, TR Gross
US Patent 8,667,287, 2014
Mixing identities with ease
P Bichsel, J Camenisch
IFIP Working Conference on Policies and Research in Identity Management, 1-17, 2010
Janus Dam Nielsen, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm. Architecture for Attribute-based Credential Technologies-Final …
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, S Krenn, ...
Data-minimizing authentication goes mobile
P Bichsel, J Camenisch, B De Decker, J Lapon, V Naessens, D Sommer
IFIP International Conference on Communications and Multimedia Security, 55-71, 2012
Security and trust through electronic social network-based interactions
P Bichsel, S Muller, FS Preiss, D Sommer, M Verdicchio
2009 International Conference on Computational Science and Engineering 4 …, 2009
H2. 2–ABC4Trust architecture for developers
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, I Krontiris, ...
ABC4Trust heartbeat H 2, 2, 2013
Survey and analysis of existing eid and credential systems
A Lehmann, P Bichsel, P Bichsel, B Bruegger, J Camenisch, AC Garcia, ...
FutureID Deliverable D 32, 2013
A calculus for privacy-friendly authentication
P Bichsel, J Camenisch, D Sommer
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
Dynamically-changing interface for interactive selection of information cards satisfying policy requirements
P Bichsel, J Camenisch, FS Preiss, D Sommer
Technical Report RZ 3756, IBM Research Zurich, 2009. domino. research. ibm …, 2009
Integration of data-minimising authentication into authorisation systems
D Ayed, P Bichsel, J Camenisch, J Den Hartog
International Conference on Trust and Trustworthy Computing, 179-187, 2014
D4. 2 final reference implementation
T Baignères, P Bichsel, RR Enderlein, H Knudsen, K Damgård, J Jensen, ...
ABC4-Trust, IBM Res., Zürich, Switzerland, 2014
Recognizing your digital friends
P Bichsel, J Camenisch, M Verdicchio
Security and Privacy in Social Networks, 27-46, 2013
The system can't perform the operation now. Try again later.
Articles 1–20