메뉴 건너뛰기




Volumn , Issue , 2008, Pages 70-80

Anonymous credentials for privacy-preserving E-learning

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS CREDENTIALS; DEVELOPING PROCESSES; E-COMMERCE; E-COMMERCE APPLICATIONS; E-LEARNING ENVIRONMENTS; E-LEARNING SYSTEMS; LEARNING PROCESSES; PRIVACY PRESERVING; PRIVACY PROTECTION;

EID: 50249118103     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MCETECH.2008.26     Document Type: Conference Paper
Times cited : (22)

References (18)
  • 3
    • 84870965272 scopus 로고    scopus 로고
    • Learning Technologies Standardization Committee LTSC, at, Retrieved September 2007
    • Learning Technologies Standardization Committee (LTSC). Web site at http://www.ieeeltsc.org/. Retrieved September 2007.
    • Web site
  • 4
    • 84870965272 scopus 로고    scopus 로고
    • IMS Global Learning Consortium, at, Retrieved September 2007
    • IMS Global Learning Consortium. Web site at http://www.imsproiect.org/. Retrieved September 2007.
    • Web site
  • 5
    • 18844457077 scopus 로고    scopus 로고
    • Privacy provision in e-learning standardized systems: Status and improvements
    • June
    • B. Jerman-Blazic and T. Klobucar, "Privacy provision in e-learning standardized systems: status and improvements," Computer Standards & Interfaces, vol. 27, pp. 561-578, June 2005.
    • (2005) Computer Standards & Interfaces , vol.27 , pp. 561-578
    • Jerman-Blazic, B.1    Klobucar, T.2
  • 8
    • 3042575530 scopus 로고    scopus 로고
    • The Negotiation of Privacy Policies in Distance Education
    • Philadelphia
    • G. Yee and L. Korba, "The Negotiation of Privacy Policies in Distance Education," in IRMA International Conference, Philadelphia, 2003.
    • (2003) IRMA International Conference
    • Yee, G.1    Korba, L.2
  • 9
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make Big Brother obsolete
    • D. Chaum, "Security without identification: Transaction systems to make Big Brother obsolete," Communications of the ACM, vol. 28, pp. 1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , pp. 1030-1044
    • Chaum, D.1
  • 10
    • 79251590715 scopus 로고
    • A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations
    • Santa Barbara
    • D. Chaum and J. Evertse, "A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations," in Advances in Cryptology -CRYPTO '86, Santa Barbara, 1987, pp. 118-167.
    • (1987) Advances in Cryptology -CRYPTO '86 , pp. 118-167
    • Chaum, D.1    Evertse, J.2
  • 13
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    • Innsbruck
    • J. Camenisch and A. Lysyanskaya, "An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation," in Advances in Cryptology - EUROCRYPT 2001, Innsbruck, 2001, pp. 93-118.
    • (2001) Advances in Cryptology - EUROCRYPT 2001 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 15
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R. C. Merkle, "Secure communications over insecure channels," Communications of the ACM, vol. 21, pp. 294-299, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 294-299
    • Merkle, R.C.1
  • 17
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.