메뉴 건너뛰기




Volumn 148, Issue , 2004, Pages 183-199

A security model for anonymous credential systems

Author keywords

Anonymity; Anonymous credential systems; Privacy; Provable security; Pseudonym systems; Unlinkability

Indexed keywords

DATA PRIVACY; INFORMATION TECHNOLOGY;

EID: 84902479270     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/1-4020-8145-6_16     Document Type: Conference Paper
Times cited : (4)

References (9)
  • 4
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Chaum, D. (1985). Security without identification: Transaction systems to make big brother obsolete. In Communications of the ACM, volume 28, pages 1030-1044.
    • (1985) Communications of the ACM , vol.28 , pp. 1030-1044
    • Chaum, D.1
  • 5
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • Odlyzko, A. M., editor, Lecture Notes in Computer Science, Springer Verlag, Berlin
    • Chaum, D. and Evertse, J.-H. (1987). A secure and privacy-protecting protocol for transmitting personal information between organizations. In Odlyzko, A. M., editor, Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, number 263 in Lecture Notes in Computer Science, pages 118-167. Springer Verlag, Berlin.
    • (1987) Advances In Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings , Issue.263 , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 6
    • 85031802442 scopus 로고
    • Payment systems and credential mechanisms with provable security against abuse by individuals
    • Goldwasser, S., editor, Lecture Notes in Computer Science, Springer Verlag
    • Damgard, I. (1990). Payment systems and credential mechanisms with provable security against abuse by individuals. In Goldwasser, S., editor, Advances in Cryptology - CRYPTO '88: Proceedings, number 403 in Lecture Notes in Computer Science, pages 328-335. Springer Verlag.
    • (1990) Advances In Cryptology - CRYPTO '88: Proceedings , Issue.403 , pp. 328-335
    • Damgard, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.