Anonymous authentication: For privacy and security

被引:0
|
作者
Sako, Kazue [1 ]
Yonezawa, Shoko [1 ]
Teranishi, Isamu [1 ]
机构
[1] Internet Systems Research Laboratories, Santa Clara, CA, United States
来源
NEC Journal of Advanced Technology | 2005年 / 2卷 / 01期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
6
引用
收藏
页码:79 / 83
相关论文
共 50 条
  • [31] A new privacy-preserving authentication protocol for anonymous web browsing
    Yang, Xu
    Yi, Xun
    Khalil, Ibrahim
    Cui, Hui
    Yang, Xuechao
    Nepal, Surya
    Huang, Xinyi
    Zeng, Yali
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [32] Anonymous authentication for mobile Single Sign-On to protect user privacy
    Elmufti, Kalid
    Weerasinghe, Dasun
    Rajarajan, Muttukrishnan
    Rakocevic, Veselin
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2008, 6 (06) : 760 - 769
  • [33] Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
    Lee, Youngsook
    Paik, Juryon
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [34] Research and Security Analysis of Anonymous Identity Authentication in Trusted Computing
    Yang, Yang
    Zhang, Huanguo
    He, Fan
    Zhang, Bo
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 409 - +
  • [35] Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication
    Khan, Muhammad Asif
    Kausar, Firdous
    Masood, Ashraf
    INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 198 - 208
  • [36] Anonymous authentication key exchange protocol with universally composable security
    Cai, Qing-Ling
    Zhan, Yi-Ju
    Liu, Yang
    Tang, Zhuo-Yi
    Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering, 2010, 27 (04): : 402 - 407
  • [37] Anonymous authentication scheme for smart home environment with provable security
    Shuai, Mengxia
    Yu, Nenghai
    Wang, Hongxia
    Xiong, Ling
    COMPUTERS & SECURITY, 2019, 86 : 132 - 146
  • [38] Anonymous Authentication for Wireless Body Area Networks With Provable Security
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Lee, Jong-Hyouk
    IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2590 - 2601
  • [39] Evolutionary Consideration on User Authentication: Security, Privacy, and Safety
    Vorakulpipat, Chalee
    Rattanalerdnusorn, Ekkachan
    IT PROFESSIONAL, 2021, 23 (05) : 38 - 43
  • [40] Biometric Encryption: Technology for strong authentication, security and privacy
    Cavoukian, Ann
    Stoianov, Alex
    Carter, Fred
    POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 57 - 77