Sciweavers

3 search results - page 1 / 1
» k-Times Anonymous Authentication (Extended Abstract)
Sort
View
ASIACRYPT
2004
Springer
14 years 4 months ago
k-Times Anonymous Authentication (Extended Abstract)
Isamu Teranishi, Jun Furukawa, Kazue Sako
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
14 years 4 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 5 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky