Results 221 to 230 of about 44,601 (278)
Some of the next articles are maybe not open access.

Related searches:

Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication

Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Anonymous authentication allows one to authenticate herself without revealing her identity, and becomes an important technique for constructing privacy-preserving Internet connections. Anonymous password authentication is highly desirable as it enables a client to authenticate herself by a human-memorable password while preserving her privacy.
Zhenfeng Zhang   +3 more
openaire   +1 more source

Anonymous Authentication

2006
The contribution of this paper is a mechanism which links authentication to audit using weak identities and takes identity out of the trust management envelope. Although our protocol supports weaker versions of anonymity it is still useful even if anonymity is not required, due to the ability to reduce trust assumptions which it provides. We illustrate
Das Chowdhury, Partha   +2 more
openaire   +1 more source

Protocols for Authenticated Anonymous Communications

2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, 2007
Anonymity and specifically sender anonymity have become essential requirements for many privacy-related applications (e.g. net counselling and whistle blowing). On the other hand, anonymity may be abused for various malicious activities (e.g. redistribution of copy-righted contents and illegal drug trading).
Hanane Fathi   +3 more
openaire   +1 more source

Anonymous Authentication with Spread Revelation

Cryptologia, 2011
This paper argues for the introduction of better privacy mechanisms and greater anonymity in electronic transactions. The introduction contains an overview of related work—namely group signatures and e-cash systems. Next, we present an original solution based on Σ-protocols, which leads to a scheme providing anonymous client authentication without any ...
Jan Hajny, Vaclav Zeman
openaire   +1 more source

Anonymous Authentication for RFID Systems

2010
In this paper, we present an anonymous authentication scheme that allows RFID tags to authenticate to readers without disclosing the tag identity or any other information that allows tags to be traced. The properties of our scheme are very useful for a variety of access control systems, where it is sufficient or mandatory to verify the authenticity of ...
Armknecht, Frederik   +3 more
openaire   +1 more source

Anonymous Authentication with TLS and DAA

2010
Anonymous credential systems provide privacy-preserving authentication solutions for accessing services and resources. In these systems, copying and sharing credentials can be a serious issue. As this cannot be prevented in software alone, these problems form a major obstacle for the use of fully anonymous authentication systems in practice.
Cesena E.   +4 more
openaire   +1 more source

Lightweight Anonymous RFID Authentication

2016
This chapter describes on lightweight RFID anonymous authentication. The widespread use of RFID tags raises a privacy concern: They make their carriers trackable. To protect the privacy of the tag carriers, we need to invent new mechanisms that keep the usefulness of tags while doing so anonymously.
Min Chen, Shigang Chen
openaire   +1 more source

Home - About - Disclaimer - Privacy