This paper presents an anonymous access scheme for electronic-services. The scheme based on tickets supports efficient authentications of users, services and services providers over different domains. Tickets are issued by a Credential Centre through a signature protocol and are used to verify correctness of the requested services as well as to direct billing information to the appropriate user. The service providers can avoid roaming to multiple service domains, only contacting the Credential Centre to certify the user's ticket since tickets carry all authorization information needed for the requested services. The user can preserve anonymity and read a clear record of charges in the Credential Centre at anytime. Furthermore, the identity ...
Cloud computing offers on-demand availability of computing resources over the Internet. κ-times anon...
In this paper, we propose an architecture to enable service providers personalise services in a perv...
Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from ...
An anonymous single sign-on (ASSO) scheme allows users to access multiple services anonymously using...
Users accessing services are often required to provide personal information, for example, age, profe...
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in pe...
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a servic...
In traditional e-cash systems, the tradeoff between anonymity and fraud-detection is solved by hidin...
[Abstract]: Security is a critical issue in mobile commerce, especially in mobile database systems s...
We present the design, security proof, and implementation of an anonymous subscription service. User...
An electronic ticket is a digital contract between two parties, that is, the user and the service pr...
The public transport ticketing systems are undergoing significant changes in recent years. The ticke...
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to jud...
Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become impo...
We propose an authentication scheme in which users can be authenticated anonymously so long as times...
Cloud computing offers on-demand availability of computing resources over the Internet. κ-times anon...
In this paper, we propose an architecture to enable service providers personalise services in a perv...
Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from ...
An anonymous single sign-on (ASSO) scheme allows users to access multiple services anonymously using...
Users accessing services are often required to provide personal information, for example, age, profe...
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in pe...
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a servic...
In traditional e-cash systems, the tradeoff between anonymity and fraud-detection is solved by hidin...
[Abstract]: Security is a critical issue in mobile commerce, especially in mobile database systems s...
We present the design, security proof, and implementation of an anonymous subscription service. User...
An electronic ticket is a digital contract between two parties, that is, the user and the service pr...
The public transport ticketing systems are undergoing significant changes in recent years. The ticke...
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to jud...
Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become impo...
We propose an authentication scheme in which users can be authenticated anonymously so long as times...
Cloud computing offers on-demand availability of computing resources over the Internet. κ-times anon...
In this paper, we propose an architecture to enable service providers personalise services in a perv...
Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from ...