Results 201 to 210 of about 104,369 (254)
Some of the next articles are maybe not open access.
Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
Fair Exchange is a fundamental problem in the exchange of digital items with direct application to electronic commerce. In a fair exchange protocol, two parties want to exchange their corresponding items such that either both receive the other's item, or neither of them receives anything.
Sepideh Avizheh +2 more
openaire +1 more source
Fair Exchange is a fundamental problem in the exchange of digital items with direct application to electronic commerce. In a fair exchange protocol, two parties want to exchange their corresponding items such that either both receive the other's item, or neither of them receives anything.
Sepideh Avizheh +2 more
openaire +1 more source
Privacy-Enhancing Technologies
The exponential growth in the acquisition and processing of personal data has necessitated a paradigm shift toward “privacy by design,” a principle that is increasingly being realized through both theoretical frameworks and technological innovations.Iván Abellán Álvarez +3 more
openaire +2 more sources
Privacy Enhancing Technologies
IEEE Security & Privacy Magazine, 2006The sixth annual Workshop on Privacy Enhancing Technologies (PET) was held in Cambridge, England, from 28-30 June 2006.
+4 more sources
Privacy Enhancing Technologies
Journal of Data Protection & Privacy, 2020Editorial on the papers published in this special edition on Privacy Enhancing ...
openaire +1 more source
2007
Using pairing techniques, we propose an anonymous authenticated key exchange scheme based on credentials issued by a trusted third party. The protocol satisfies several security properties related to user privacy such as unforgeability, limitability, non-transferability, and unlinkability.
Junji Nakazato +2 more
openaire +1 more source
Using pairing techniques, we propose an anonymous authenticated key exchange scheme based on credentials issued by a trusted third party. The protocol satisfies several security properties related to user privacy such as unforgeability, limitability, non-transferability, and unlinkability.
Junji Nakazato +2 more
openaire +1 more source

