Results 11 to 20 of about 44,601 (278)

Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [PDF]

open access: yesJisuanji kexue, 2023
As a typical representative of the Internet of Things,the Internet of Vehicles plays an important role in intelligent transportation,not only providing vehicles with a variety of online services,but also reducing the risk of accidents for drivers.However,
GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong
doaj   +1 more source

Anonymous Whistleblowing over Authenticated Channels

open access: yes, 2022
The goal of anonymous whistleblowing is to publicly disclose a message while at the same time hiding the identity of the sender in a way that even if suspected of being the sender, this cannot be proven. While many solutions to this problem have been proposed over the years, they all require some form of interaction with trusted or non-colluding ...
Agrikola, Thomas   +2 more
openaire   +3 more sources

Anonymity and authenticity on the web [PDF]

open access: yesInternet Pragmatics, 2021
AbstractBuilding on our own research (Kersten and Lotze 2018,2020;Lotze and Kersten in press,under review) as well as other work in this area (Bechar-Israeli 1995;Stommel 2007;Lindholm 2013;Aleksiejuk 2016a,2016b), this article will discuss the pragmatics of (self-)naming practices online and how they contribute to identity construction and face-work ...
Saskia Kersten, Netaya Lotze
openaire   +1 more source

Cross-Domain Identity Authentication Scheme Based on Heterogeneous Systems in Hybrid Cloud Environment [PDF]

open access: yesJisuanji gongcheng, 2019
In the hybrid cloud environment,in order to meet the cross-domain authentication requirements of identity authentication schemes between different cryptosystems,a cross-domain identity authentication scheme based on Public Key Infrastructure(PKI) and ...
JIANG Zetao, SHI Chen
doaj   +1 more source

Anonymous Single-Sign-On for n designated services with traceability [PDF]

open access: yes, 2018
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations.
CI Fan   +26 more
core   +2 more sources

Patient privacy protection using anonymous access control techniques [PDF]

open access: yes, 2008
Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases.
Elmufti, K.   +3 more
core   +1 more source

On the efficiency of revocation in RSA-based anonymous systems [PDF]

open access: yes, 2016
© 2016 IEEEThe problem of revocation in anonymous authentication systems is subtle and has motivated a lot of work. One of the preferable solutions consists in maintaining either a whitelist L-W of non-revoked users or a blacklist L-B of revoked users ...
Fueyo, María, Herranz Sotoca, Javier
core   +2 more sources

Maintaining unlinkability in group based P2P environments [PDF]

open access: yes, 2009
In the wake of the success of Peer-to-Peer (P2P) networking, security has arisen as one of its main concerns, becoming a key issue when evaluating a P2P system.
Arnedo Moreno, Joan   +1 more
core   +1 more source

Cross-Domain Self-Authentication Based Consortium Blockchain for Autonomous Valet Parking System

open access: yesIEEE Access, 2022
This paper proposed a cross-domain self-authentication scheme to address the “information isolated island” problem of users’ identities storage in servers and the “redundant registration problem” of users’ ...
Lei Hua   +3 more
doaj   +1 more source

Investigating Anonymity in Group Based Anonymous Authentication [PDF]

open access: yes, 2009
In this paper we discuss anonymity in context of group based anonymous authentication (\(\mathcal{GBAA}\)). Methods for \(\mathcal{GBAA}\) provide mechanisms such that a user is able to prove membership in a group \(\mathcal{U}'\subseteq\mathcal{U}\) of authorized users \(\mathcal{U}\) to a verifier, whereas the verifier does not obtain any information
Daniel Slamanig, Christian Stingl
openaire   +1 more source

Home - About - Disclaimer - Privacy