Pervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks, where privacy preservation is a crucial issue. One of the effective methods to achieve privacy preservation is anonymous authentication on trust. However, few literatures pay attention to it. In this paper, we propose an anonymous authentication scheme based on group signature for authenticating trust levels rather than identities of nodes in order to avoid privacy leakage and guarantee secure communications in PSN. The scheme achieves secure anonymous authentication with anonymity and conditional traceability with the support of a trusted authority (TA). We also provide a mechanism to guarantee communica...
Abstract—In a reputation based trust network, each peer stores trust information of others and answe...
Abstract In pervasive computing environments (PCEs), privacy and security are two important but cont...
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a servic...
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with t...
Pervasive Social Networking (PSN) supports various social activities at any time and in any places w...
Pervasive social networking (PSN) is facilitating and enriching people’s life at any time and in any...
In order to protect the user's privacy identity, authentication requires anonymous authentication. A...
In our highly computerized and networked society, privacy of individuals is precious and becomes inc...
[[abstract]]Online social networks (OSNs) such as Facebook and MySpace are flourishing because more ...
Online Social Networks (OSNs) have been one of the most successful web-based communication models. I...
Crowdsensing requires scalable privacy-preserving authentication that allows users to send anonymous...
Social network has extended its popularity from the Internet to mobile domain. Pervasive social netw...
Nowadays, the design of a secure access authentication protocol in heterogeneous networks achieving ...
Pervasive Social Networking (PSN) intends to support instant social activities in a pervasive way at...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
Abstract—In a reputation based trust network, each peer stores trust information of others and answe...
Abstract In pervasive computing environments (PCEs), privacy and security are two important but cont...
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a servic...
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with t...
Pervasive Social Networking (PSN) supports various social activities at any time and in any places w...
Pervasive social networking (PSN) is facilitating and enriching people’s life at any time and in any...
In order to protect the user's privacy identity, authentication requires anonymous authentication. A...
In our highly computerized and networked society, privacy of individuals is precious and becomes inc...
[[abstract]]Online social networks (OSNs) such as Facebook and MySpace are flourishing because more ...
Online Social Networks (OSNs) have been one of the most successful web-based communication models. I...
Crowdsensing requires scalable privacy-preserving authentication that allows users to send anonymous...
Social network has extended its popularity from the Internet to mobile domain. Pervasive social netw...
Nowadays, the design of a secure access authentication protocol in heterogeneous networks achieving ...
Pervasive Social Networking (PSN) intends to support instant social activities in a pervasive way at...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
Abstract—In a reputation based trust network, each peer stores trust information of others and answe...
Abstract In pervasive computing environments (PCEs), privacy and security are two important but cont...
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a servic...