Sciweavers

3 search results - page 1 / 1
» License Protection with a Tamper-Resistant Token
Sort
View
WISA
2004
Springer
13 years 10 months ago
License Protection with a Tamper-Resistant Token
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that i...
Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro E...
IH
1998
Springer
13 years 9 months ago
Biometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
Gerrit Bleumer
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
14 years 5 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente