Sciweavers

116 search results - page 3 / 24
» A Security Model for Anonymous Credential Systems
Sort
View
ACNS
2003
Springer
185views Cryptology» more  ACNS 2003»
13 years 11 months ago
Anonymity-Enhanced Pseudonym System
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonyms. Such schemes are of significant practical relevance because it is the best m...
Yuko Tamura, Atsuko Miyaji
IACR
2011
137views more  IACR 2011»
12 years 5 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
ACISP
2003
Springer
13 years 11 months ago
An Anonymous Credential System and a Privacy-Aware PKI
Abstract. In this paper we present a non-transferable anonymous credential system that is based on the concept of a chameleon certificate. A chameleon certificate is a special ce...
Pino Persiano, Ivan Visconti
CCS
2007
ACM
13 years 12 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
IAT
2006
IEEE
13 years 11 months ago
Trust Negotiations with Customizable Anonymity
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosin...
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantz...