Sciweavers

63 search results - page 6 / 13
» Vulnerabilities in Anonymous Credential Systems
Sort
View
FC
2007
Springer
118views Cryptology» more  FC 2007»
14 years 5 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
ACSAC
2004
IEEE
14 years 2 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
ISW
1999
Springer
14 years 3 months ago
On Anonymous Electronic Cash and Crime
Anonymous electronic cash systems can be vulnerable to criminal abuse. Two approaches were suggested for solving this problem. In an escrowed cash system users are given anonymity ...
Tomas Sander, Amnon Ta-Shma
MOBICOM
2010
ACM
13 years 11 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
14 years 4 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré