Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [PDF]
As a typical representative of the Internet of Things,the Internet of Vehicles plays an important role in intelligent transportation,not only providing vehicles with a variety of online services,but also reducing the risk of accidents for drivers.However,
GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong
doaj +1 more source
Anonymous Whistleblowing over Authenticated Channels
The goal of anonymous whistleblowing is to publicly disclose a message while at the same time hiding the identity of the sender in a way that even if suspected of being the sender, this cannot be proven. While many solutions to this problem have been proposed over the years, they all require some form of interaction with trusted or non-colluding ...
Agrikola, Thomas +2 more
openaire +3 more sources
Anonymity and authenticity on the web [PDF]
AbstractBuilding on our own research (Kersten and Lotze 2018,2020;Lotze and Kersten in press,under review) as well as other work in this area (Bechar-Israeli 1995;Stommel 2007;Lindholm 2013;Aleksiejuk 2016a,2016b), this article will discuss the pragmatics of (self-)naming practices online and how they contribute to identity construction and face-work ...
Saskia Kersten, Netaya Lotze
openaire +1 more source
Cross-Domain Identity Authentication Scheme Based on Heterogeneous Systems in Hybrid Cloud Environment [PDF]
In the hybrid cloud environment,in order to meet the cross-domain authentication requirements of identity authentication schemes between different cryptosystems,a cross-domain identity authentication scheme based on Public Key Infrastructure(PKI) and ...
JIANG Zetao, SHI Chen
doaj +1 more source
Anonymous Single-Sign-On for n designated services with traceability [PDF]
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations.
CI Fan +26 more
core +2 more sources
Patient privacy protection using anonymous access control techniques [PDF]
Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases.
Elmufti, K. +3 more
core +1 more source
On the efficiency of revocation in RSA-based anonymous systems [PDF]
© 2016 IEEEThe problem of revocation in anonymous authentication systems is subtle and has motivated a lot of work. One of the preferable solutions consists in maintaining either a whitelist L-W of non-revoked users or a blacklist L-B of revoked users ...
Fueyo, María, Herranz Sotoca, Javier
core +2 more sources
Maintaining unlinkability in group based P2P environments [PDF]
In the wake of the success of Peer-to-Peer (P2P) networking, security has arisen as one of its main concerns, becoming a key issue when evaluating a P2P system.
Arnedo Moreno, Joan +1 more
core +1 more source
Cross-Domain Self-Authentication Based Consortium Blockchain for Autonomous Valet Parking System
This paper proposed a cross-domain self-authentication scheme to address the “information isolated island” problem of users’ identities storage in servers and the “redundant registration problem” of users’ ...
Lei Hua +3 more
doaj +1 more source
Investigating Anonymity in Group Based Anonymous Authentication [PDF]
In this paper we discuss anonymity in context of group based anonymous authentication (\(\mathcal{GBAA}\)). Methods for \(\mathcal{GBAA}\) provide mechanisms such that a user is able to prove membership in a group \(\mathcal{U}'\subseteq\mathcal{U}\) of authorized users \(\mathcal{U}\) to a verifier, whereas the verifier does not obtain any information
Daniel Slamanig, Christian Stingl
openaire +1 more source

