Sciweavers

49 search results - page 2 / 10
» Anonymity-Enhanced Pseudonym System
Sort
View
ENTCS
2008
130views more  ENTCS 2008»
13 years 9 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
ASIACRYPT
2001
Springer
14 years 1 months ago
Self-Blindable Credential Certificates from the Weil Pairing
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The ...
Eric R. Verheul
MMMACNS
2005
Springer
14 years 2 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer
SACRYPT
1999
Springer
14 years 1 months ago
Pseudonym Systems
Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, St...
JSW
2008
240views more  JSW 2008»
13 years 9 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer