Sciweavers

116 search results - page 1 / 24
» Anonymous Authentication
Sort
View
104
Voted
PKC
2007
Springer
135views Cryptology» more  PKC 2007»
15 years 6 months ago
A Direct Anonymous Attestation Scheme for Embedded Devices
Abstract. Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. Th...
He Ge, Stephen R. Tate
92
Voted
ACSAC
2009
IEEE
15 years 7 months ago
A New Approach for Anonymous Password Authentication
—Anonymous password authentication reinforces password authentication with the protection of user privacy. Considering the increasing concern of individual privacy nowadays, anon...
Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao
107
Voted
IACR
2011
137views more  IACR 2011»
14 years 1 days ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
100
Voted
IJNSEC
2006
122views more  IJNSEC 2006»
15 years 12 days ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti
107
Voted
PERCOM
2005
ACM
16 years 41 min ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong