Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosing digital credentials and policies. Credentials, exchanged during trust negotiations, often contain sensitive attributes that attest to the properties of the credential owner. Uncontrolled disclosure of such sensitive attributes may cause grave damage to the credential owner. Research has shown that disclosing non-sensitive attributes only can cause identity to be revealed as well. Consequently, we impose a stronger requirement: our negotiations should have the k-anonymity property -- the set of credentials submitted by a subject during a negotiation should be equal...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Abstract: As a useful means of safeguarding privacy of communications, deniable authentication has r...
In automated trust negotiation, two parties exchange digitally signed credentials that contain attri...
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain...
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain...
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iter...
The secure release of identity attributes is a key enabler for electronic business interactions. Int...
The increasing use of Internet in a variety of distributed multiparty interactions and transactions ...
Need-to-know is a fundamental security concept: a party should not learn information that is irrelev...
Trust negotiation is a promising approach for establishing trust in open systems, where sensitive in...
[[abstract]]In a deniable authentication protocol, a receiver is convinced that a received message i...
Need-to-know is a fundamental security concept: a party should not learn information that is irrelev...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Abstract: As a useful means of safeguarding privacy of communications, deniable authentication has r...
In automated trust negotiation, two parties exchange digitally signed credentials that contain attri...
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain...
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain...
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iter...
The secure release of identity attributes is a key enabler for electronic business interactions. Int...
The increasing use of Internet in a variety of distributed multiparty interactions and transactions ...
Need-to-know is a fundamental security concept: a party should not learn information that is irrelev...
Trust negotiation is a promising approach for establishing trust in open systems, where sensitive in...
[[abstract]]In a deniable authentication protocol, a receiver is convinced that a received message i...
Need-to-know is a fundamental security concept: a party should not learn information that is irrelev...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Anonymity and authenticity are both important yet often conflicting security goals in a wide range o...
Abstract: As a useful means of safeguarding privacy of communications, deniable authentication has r...