메뉴 건너뛰기




Volumn 5, Issue 3, 2007, Pages 69-71

Authentication without identification

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; USER INTERFACES;

EID: 34250021566     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.52     Document Type: Review
Times cited : (3)

References (8)
  • 1
    • 0022145479 scopus 로고
    • Security without Identification: Transaction Systems to Make Big Brother Obsolete
    • D. Chaum Security without Identification: Transaction Systems to Make Big Brother Obsolete Comm. ACM 28 10 1030 1044 1985
    • (1985) Comm. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 2
    • 0003808928 scopus 로고    scopus 로고
    • Rethinking Public-Key Infrastructures and Digital Certificates: Building in Privacy
    • MIT Press
    • S. Brands Rethinking Public-Key Infrastructures and Digital Certificates: Building in Privacy 2000 MIT Press
    • (2000)
    • Brands, S.1
  • 3
    • 0011584005 scopus 로고    scopus 로고
    • Uniqueness of Simple Demographics in the US Population
    • L. Sweeney Uniqueness of Simple Demographics in the US Population 2000 LIDAP-WP4 Carnegie Mellon Univ., School of Computer Science
    • (2000)
    • Sweeney, L.1
  • 4
    • 0022914590 scopus 로고
    • Proofs that Yield Nothing but Their Validity and a Methodology of Cryptographic Protocol Design
    • O. Goldreich S. Micali A. Wigderson Proofs that Yield Nothing but Their Validity and a Methodology of Cryptographic Protocol Design Proc. IEEE Foundations of Computer Science 174 187 Proc. IEEE Foundations of Computer Science 1986
    • (1986) , pp. 174-187
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 5
    • 85176999843 scopus 로고    scopus 로고
    • Proc. Selected Areas in Cryptography 1999
    • Pseudonym Systems Springer-Verlag
    • A. Lysyanskaya Proc. Selected Areas in Cryptography 1999 184 199 1999 Springer-Verlag Pseudonym Systems
    • (1999) , pp. 184-199
    • Lysyanskaya, A.1
  • 6
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient System for Non-Transferable Anonymous Credentials
    • J. Camenisch A. Lysyanskaya An Efficient System for Non-Transferable Anonymous Credentials Proc. Eurocrypt 2001 93 118 Proc. Eurocrypt 2001 2001
    • (2001) , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 35248839965 scopus 로고    scopus 로고
    • A Signature Scheme with Efficient Protocols
    • J. Camenisch A. Lysyanskaya A Signature Scheme with Efficient Protocols Proc. Security in Comm. Networks 2002 268 289 Proc. Security in Comm. Networks 2002 2002
    • (2002) , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 8
    • 0038687775 scopus 로고    scopus 로고
    • Design and Implementation of the Idemix Anonymous Credential System
    • J. Camenisch E. van Herreweghen Design and Implementation of the Idemix Anonymous Credential System Proc. ACM Conf. on Computer and Comm. Security 21 30 Proc. ACM Conf. on Computer and Comm. Security 2002
    • (2002) , pp. 21-30
    • Camenisch, J.1    van Herreweghen, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.