PRIVACY PROTECTION FOR USER AUTHENTICATION

被引:0
|
作者
Hajny, Jan [1 ]
Pelka, Tomas [1 ]
Zeman, Vaclav [1 ]
机构
[1] Brno Univ Technol, Fac Elect Engn & Commun, Dept Telecommun, Purkynova 118, Brno, Czech Republic
来源
SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2010年
关键词
Privacy; Anonymity; Security; Protocol; Authentication; Identity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper deals with Internet user privacy. We focus on the protection of user identity during an Internet service use. We start with an overview of systems for the anonymous channel creation. Such channels are necessary as any solution for the identity protection will have to work with the TCP/IP protocols used in the Internet. In the second part of the paper we argue about the need for an anonymous authentication introduction. Such a service is almost missing in the current Internet. We show how the concept of anonymous authentication could improve privacy and identity protection. Finally we introduce our concept for anonymous authentication with the feature of a malicious user detection.
引用
收藏
页码:90 / 93
页数:4
相关论文
共 50 条
  • [1] Efficient 3 GPP authentication and key agreement with robust user privacy protection
    Juang, Wen-Senq
    Wu, Jing-Lin
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2722 - 2727
  • [2] Multidevice Authentication with Strong Privacy Protection
    Hajny, Jan
    Dzurenda, Petr
    Malina, Lukas
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [3] Authentication User’s Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services
    Imran Memon
    Wireless Personal Communications, 2015, 82 : 1585 - 1600
  • [5] Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    Hu, Bin
    Wong, Duncan S.
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 124 - 129
  • [6] A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth
    Chen, Yuwen
    Martinez, Jose-Fernan
    Castillejo, Pedro
    Lopez, Lourdes
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
  • [7] Privacy Protection for E-Health Systems using Three-Factor User Authentication
    Ying, Bidi
    Mohsen, Nada Radwan
    Nayak, Amiya
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [8] Face Transparent User Authentication Respecting Privacy
    Guiga, Takoua
    Schwartzmann, Jean-Jacques
    Rosenberger, Christophe
    2021 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2021), 2021, : 278 - 286
  • [9] A user authentication scheme with identity and location privacy
    Hirose, S
    Yoshida, S
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 235 - 246
  • [10] Biometric Authentication: System Security and User Privacy
    Jain, Anil K.
    Nandakumar, Karthik
    COMPUTER, 2012, 45 (11) : 87 - 92