Sciweavers

116 search results - page 2 / 24
» Anonymous Authentication
Sort
View
CARDIS
2006
Springer
123views Hardware» more  CARDIS 2006»
13 years 9 months ago
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However,...
Martin Schaffer, Peter Schartner
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
13 years 7 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
JCST
2008
98views more  JCST 2008»
13 years 5 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...
CCS
2007
ACM
13 years 11 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
13 years 11 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...