Sciweavers

677 search results - page 4 / 136
» Secure Pseudonymous Channels
Sort
View
JSW
2008
240views more  JSW 2008»
13 years 9 months ago
A Secure e-Health Architecture based on the Appliance of Pseudonymization
Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massiv...
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
SPW
2004
Springer
14 years 3 months ago
Pseudonymity in the Light of Evidence-Based Trust
This position paper discusses the relation of privacy, namely pseudonymity, to evidence-based trust (or rather reputation). Critical concepts of evidence-based trust/reputation sys...
Daniel Cvrcek, Václav Matyás Jr.
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 4 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
EGOV
2011
Springer
12 years 9 months ago
Pseudonymization Service for X-Road eGovernment Data Exchange Layer
Abstract. Pseudonymization is sometimes used as a light-weight alternative to fully cryptographic solutions, when information from different data sources needs to be linked in a p...
Jan Willemson
TRUSTBUS
2005
Springer
14 years 3 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...