Results 221 to 230 of about 44,601 (278)
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments. [PDF]
Liu Y, Li C, Sun Q, Jiang H.
europepmc +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016Anonymous authentication allows one to authenticate herself without revealing her identity, and becomes an important technique for constructing privacy-preserving Internet connections. Anonymous password authentication is highly desirable as it enables a client to authenticate herself by a human-memorable password while preserving her privacy.
Zhenfeng Zhang +3 more
openaire +1 more source
2006
The contribution of this paper is a mechanism which links authentication to audit using weak identities and takes identity out of the trust management envelope. Although our protocol supports weaker versions of anonymity it is still useful even if anonymity is not required, due to the ability to reduce trust assumptions which it provides. We illustrate
Das Chowdhury, Partha +2 more
openaire +1 more source
The contribution of this paper is a mechanism which links authentication to audit using weak identities and takes identity out of the trust management envelope. Although our protocol supports weaker versions of anonymity it is still useful even if anonymity is not required, due to the ability to reduce trust assumptions which it provides. We illustrate
Das Chowdhury, Partha +2 more
openaire +1 more source
Protocols for Authenticated Anonymous Communications
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, 2007Anonymity and specifically sender anonymity have become essential requirements for many privacy-related applications (e.g. net counselling and whistle blowing). On the other hand, anonymity may be abused for various malicious activities (e.g. redistribution of copy-righted contents and illegal drug trading).
Hanane Fathi +3 more
openaire +1 more source
Anonymous Authentication with Spread Revelation
Cryptologia, 2011This paper argues for the introduction of better privacy mechanisms and greater anonymity in electronic transactions. The introduction contains an overview of related work—namely group signatures and e-cash systems. Next, we present an original solution based on Σ-protocols, which leads to a scheme providing anonymous client authentication without any ...
Jan Hajny, Vaclav Zeman
openaire +1 more source
Anonymous Authentication for RFID Systems
2010In this paper, we present an anonymous authentication scheme that allows RFID tags to authenticate to readers without disclosing the tag identity or any other information that allows tags to be traced. The properties of our scheme are very useful for a variety of access control systems, where it is sufficient or mandatory to verify the authenticity of ...
Armknecht, Frederik +3 more
openaire +1 more source
Anonymous Authentication with TLS and DAA
2010Anonymous credential systems provide privacy-preserving authentication solutions for accessing services and resources. In these systems, copying and sharing credentials can be a serious issue. As this cannot be prevented in software alone, these problems form a major obstacle for the use of fully anonymous authentication systems in practice.
Cesena E. +4 more
openaire +1 more source
Lightweight Anonymous RFID Authentication
2016This chapter describes on lightweight RFID anonymous authentication. The widespread use of RFID tags raises a privacy concern: They make their carriers trackable. To protect the privacy of the tag carriers, we need to invent new mechanisms that keep the usefulness of tags while doing so anonymously.
Min Chen, Shigang Chen
openaire +1 more source

