Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonyms. Such schemes are of significant practical relevance because it is the best means of providing privacy for users. In previous works, users transact with a organization by demonstration of possession of a credential issued by the organization or relationship with another credential. However, the information that a user has a credential from a specific organization compromises privacy of the user. In the present paper, we give a formal definition of practical pseudonym system in which the level of privacy provided can be chosen be according to security policies.Applied cryptography and network security : first International Conference, ACNS 2...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
Abstract:- A credential system enables a person to identify themselves by their pseudonyms while the...
Abstract-A credential system is a system in which users can obtain credentials from organizations an...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
In service providing systems, user authentication is required for different purposes such as billing...
Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding id...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they...
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
A credential system is a system in which users can obtain credentials from organizations and demonst...
It takes time for theoretical advances to get used in practical schemes. Anonymous cre-dential schem...
International audienceAnonymous credential systems allow users to obtain certified credentials from ...
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an anonymous network....
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
Abstract:- A credential system enables a person to identify themselves by their pseudonyms while the...
Abstract-A credential system is a system in which users can obtain credentials from organizations an...
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics...
In service providing systems, user authentication is required for different purposes such as billing...
Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding id...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they...
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
A credential system is a system in which users can obtain credentials from organizations and demonst...
It takes time for theoretical advances to get used in practical schemes. Anonymous cre-dential schem...
International audienceAnonymous credential systems allow users to obtain certified credentials from ...
We present a reputation scheme for a pseudonymous peer-to-peer (P2P) system in an anonymous network....
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...