메뉴 건너뛰기




Volumn 1962, Issue , 2001, Pages 276-294

Authentic attributes with fine-grained anonymity protection

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY;

EID: 84944321048     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45472-1_19     Document Type: Conference Paper
Times cited : (11)

References (29)
  • 2
    • 84957085257 scopus 로고    scopus 로고
    • An Efficient Public Key Traitor Tracing Scheme
    • M. Wiener (ed.), Springer- Verlag, LNCS
    • Dan Boneh and Matthew Franklin. “An Efficient Public Key Traitor Tracing Scheme”, in Advances in Cryptology - CRYPTO’99, M. Wiener (ed.), Springer- Verlag, LNCS vol. 1666, pp. 338-353, 1999.
    • (1999) Advances in Cryptology - CRYPTO’99 , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 5
    • 0022145479 scopus 로고
    • Security without Identification: Transaction Systems to Make Big Brother Obsolete
    • (28,10), October
    • David Chaum “Security without Identification: Transaction Systems to Make Big Brother Obsolete”, CACM (28,10), October 1985, pp. 1030-1044.
    • (1985) CACM , pp. 1030-1044
    • Chaum, D.1
  • 7
    • 84944343461 scopus 로고    scopus 로고
    • CyberGold
    • CyberGold. www.cybergold.com
  • 9
    • 84944343462 scopus 로고    scopus 로고
    • DoubleClick
    • DoubleClick. www.doubleclick.com
  • 11
    • 3142747919 scopus 로고    scopus 로고
    • Auditable Metering with Lightweight Security
    • R. Hirschfeld (ed.)Springer-Verlag, LNCS
    • Matthew K. Eranklin and Dahlia Malkhi. “Auditable Metering with Lightweight Security”, in Financial Cryptography: FC ‘97, Proceedings, R. Hirschfeld (ed.), Springer-Verlag, LNCS vol. 1318, pp. 151-160, 1998.
    • (1998) Financial Cryptography: FC ‘97, Proceedings , vol.1318 , pp. 151-160
    • Eranklin, M.K.1    Malkhi, D.2
  • 12
    • 84944343464 scopus 로고    scopus 로고
    • Free PC
    • Free PC. www.free-pc.com
  • 14
    • 0005063385 scopus 로고    scopus 로고
    • Onion Routing for Anonymous and Private Internet Connection
    • February, (More information and further publications at
    • David Goldschlag, Michael Reed and Paul Syverson. “Onion Routing for Anonymous and Private Internet Connection”, Communications of the ACM, vol. 42 no. 2, February 1999, pp. 39-41. (More information and further publications at www.onion-router.net)
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 15
    • 84957649548 scopus 로고    scopus 로고
    • Identity Escrow
    • H. Krawczyk (ed.), Springer-Verlag, LNCS
    • Joe Kilian and Erez Petrank. “Identity Escrow”, in Advances in Cryptology— CRYPTO’98, H. Krawczyk (ed.), Springer-Verlag, LNCS vol. 1462, pp. 169-185, 1998.
    • (1998) Advances in Cryptology— CRYPTO’98 , vol.1462 , pp. 169-185
    • Kilian, J.1    Petrank, E.2
  • 17
    • 84944343466 scopus 로고    scopus 로고
    • Big Brother, Big ‘Fun’ at Amazon
    • Aug. 25
    • Declan McCullagh. “Big Brother, Big ‘Fun’ at Amazon”, Wired News, Aug. 25, www.wired.com/news/news/business/story/21417.html
    • Wired News
    • McCullagh, D.1
  • 19
    • 84944343467 scopus 로고    scopus 로고
    • NetZero.www.netzero.com
  • 21
    • 84944343469 scopus 로고    scopus 로고
    • Passport from Microsoft
    • Passport from Microsoft, www.passport.com.
  • 23
    • 84957030837 scopus 로고    scopus 로고
    • Protocols using Anonymous Connections: Mobile Applications
    • B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.)Springer-Verlag, LNCS
    • Michael G. Reed, Paul F. Syverson, and David M. Goldschlag. “Protocols using Anonymous Connections: Mobile Applications”, in Security Protocols: 5th Inter International Workshop, B. Christianson, B. Crispo, M. Lomas, and M. Roe (eds.), Springer-Verlag, LNCS vol. 1361, pp. 13-23, 1997.
    • (1997) Security Protocols: 5Th Inter International Workshop , vol.1361 , pp. 13-23
    • Reed, M.G.1    Syverson, P.F.2    Goldschlag, D.M.3
  • 24
    • 0029210673 scopus 로고
    • Recent-Secure Authentication: Enforcing Revocation in Distributed Systems
    • IEEE CS Press, May
    • Stuart Stubblebine. “Recent-Secure Authentication: Enforcing Revocation in Distributed Systems” in Proceedings of the 1995 IEEE Symposium on Security and Privacy, IEEE CS Press, pp. 224-234, May 1995.
    • (1995) Proceedings of the 1995 IEEE Symposium on Security and Privacy , pp. 224-234
    • Stubblebine, S.1
  • 25
    • 0005072366 scopus 로고    scopus 로고
    • Unlinkable Serial Transactions: Protocols and Applications
    • A preliminary version of this paper appears in [26]
    • Stuart G. Stubblebine, Paul F. Syverson, and David M. Goldschlag. “Unlinkable Serial Transactions: Protocols and Applications”, ACM Transaction on Information and Systems Security, Vol. 2, No 4, 1999. A preliminary version of this paper appears in [26].
    • (1999) ACM Transaction on Information and Systems Security , vol.2 , Issue.4
    • Stubblebine, S.G.1    Syverson, P.F.2    Goldschlag, D.M.3
  • 27
    • 84924758404 scopus 로고    scopus 로고
    • Group Principals and the Formalization of Anonymity
    • J.M. Wing, J. Woodcock, and J. Davies (eds.), Springer-Verlag, LNCS
    • Paul Syverson and Stuart Stubblebine. “Group Principals and the Formalization of Anonymity”, in FM’99 - Formal Methods, Vol. 1, J.M. Wing, J. Woodcock, and J. Davies (eds.), Springer-Verlag, LNCS vol. 1708, pp. 814-833, 1999.
    • (1999) FM’99 - Formal Methods , vol.1708 , pp. 814-833
    • Syverson, P.1    Stubblebine, S.2
  • 29
    • 84944343471 scopus 로고    scopus 로고
    • Zero-Knowledge Systems
    • Zero-Knowledge Systems, www.zeroknowledge.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.