Sciweavers

32 search results - page 3 / 7
» Efficient attributes for anonymous credentials
Sort
View
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
14 years 6 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
FC
2008
Springer
96views Cryptology» more  FC 2008»
13 years 6 months ago
An Efficient Anonymous Credential System
Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto
ICDE
2009
IEEE
176views Database» more  ICDE 2009»
14 years 7 months ago
Efficient Table Anonymization for Aggregate Query Answering
Abstract-- Privacy protection is a major concern when microdata needs to be released for ad hoc analyses. This has led to a lot of recent research in privacy goals and table anonym...
Cecilia M. Procopiuc, Divesh Srivastava
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 1 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
PET
2005
Springer
13 years 11 months ago
Anonymity Preserving Techniques in Trust Negotiations
Trust negotiation between two subjects require each one proving its properties to the other. Each subject specifies disclosure policies stating the types of credentials and attrib...
Indrakshi Ray, Elisa Bertino, Anna Cinzia Squiccia...