In service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc., to protect the privacy of users, their real identities should not be linked to the services that they use during authentication. A good solution is to use pseudonyms as temporary identities. On the other hand, it may also be required to have a backdoor in pseudonym systems for identity revealing that can be used by law enforcement agencies for legal reasons. Existing systems that retain a backdoor are either punitive (full user anonymity is revealed), or they are restrictive by revealing only current pseudonym identity of. In addition to that, existing systems are designed for a particular service and ...
Research into the established area of Intelligent Transportation System (ITS) is still evolving and ...
Anonymous credential is an important tool to protect the identity of users in the Internet for vario...
Several credential systems have been proposed in which users can authenticate to services anonymousl...
In service providing systems, user authentication is required for different purposes such as billing...
AbstractThis paper deals with privacy-preserving (pseudonymized) access to a service resource. In su...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonym...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
We propose an identity management system that supports role-based pseudonymsthat are bound to a give...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
Abstract—Pseudonyms are pseudonymous certificates, which are regarded as a silver bullet to meet the...
Attribute-based authentication is considered a cornerstone component to achieve scalable fine-graine...
There is a demand for a pseudonymization service by a Trusted Third Party (TTP), that features clien...
Research into the established area of Intelligent Transportation System (ITS) is still evolving and ...
Anonymous credential is an important tool to protect the identity of users in the Internet for vario...
Several credential systems have been proposed in which users can authenticate to services anonymousl...
In service providing systems, user authentication is required for different purposes such as billing...
AbstractThis paper deals with privacy-preserving (pseudonymized) access to a service resource. In su...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonym...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
We propose an identity management system that supports role-based pseudonymsthat are bound to a give...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
Abstract—Pseudonyms are pseudonymous certificates, which are regarded as a silver bullet to meet the...
Attribute-based authentication is considered a cornerstone component to achieve scalable fine-graine...
There is a demand for a pseudonymization service by a Trusted Third Party (TTP), that features clien...
Research into the established area of Intelligent Transportation System (ITS) is still evolving and ...
Anonymous credential is an important tool to protect the identity of users in the Internet for vario...
Several credential systems have been proposed in which users can authenticate to services anonymousl...