In this paper, we outline an approach to the identification of entities for access control that is based on the membership of groups, rather than individuals. By using group membership as a level of indirection between the individual and the system, we can increase privacy and provide incentives for better behaviour. Privacy comes from the use of pseudonyms generated within the group and which can be authenticated as belonging to the group. The incentives for better behaviour come from the continuous nature of groups- members may come and go, but the group lives on, and groups are organised so as to ensure group-longevity, and prevent actions which may harm the group’s reputation. We present a novel pseudonym generation mechanism suitable f...
Secure group communication protocols, in particular multi-party key agreement and update algorithms,...
Abstract. Anonymous group authentication provides an individual with the ability to prove membership...
People tend to interact and communicate with others throughout their life. In the age of pervasive c...
In our highly computerized and networked society, privacy of individuals is precious and becomes inc...
[[abstract]]Privacy and authentication are very important concepts and service levels to anonymous c...
Crowdsensing requires scalable privacy-preserving authentication that allows users to send anonymous...
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonym...
In our highly computerized and networked society, privacy of individuals is precious and becomes inc...
This chapter introduces the notion of social machines as a way of conceptualising and formalising th...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
A group signature scheme allows members of a group to sign messages anonymously. To counter misuse, ...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they...
As personal information increases in value, the incentives for re-mote services to collect as much o...
There are various situations where a distinction needs to be made between group members and outsider...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
Secure group communication protocols, in particular multi-party key agreement and update algorithms,...
Abstract. Anonymous group authentication provides an individual with the ability to prove membership...
People tend to interact and communicate with others throughout their life. In the age of pervasive c...
In our highly computerized and networked society, privacy of individuals is precious and becomes inc...
[[abstract]]Privacy and authentication are very important concepts and service levels to anonymous c...
Crowdsensing requires scalable privacy-preserving authentication that allows users to send anonymous...
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonym...
In our highly computerized and networked society, privacy of individuals is precious and becomes inc...
This chapter introduces the notion of social machines as a way of conceptualising and formalising th...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
A group signature scheme allows members of a group to sign messages anonymously. To counter misuse, ...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they...
As personal information increases in value, the incentives for re-mote services to collect as much o...
There are various situations where a distinction needs to be made between group members and outsider...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
Secure group communication protocols, in particular multi-party key agreement and update algorithms,...
Abstract. Anonymous group authentication provides an individual with the ability to prove membership...
People tend to interact and communicate with others throughout their life. In the age of pervasive c...