X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
security (9) 9
computer science, information systems (6) 6
authentication (5) 5
privacy (5) 5
unlinkable secret handshakes (4) 4
anonymity (3) 3
computer science, theory & methods (3) 3
cryptographic protocols (3) 3
cryptography (3) 3
unlinkable serial transactions (3) 3
affiliation-hiding (2) 2
asymmetric group key agreement (2) 2
asymmetry (2) 2
authentifizierung (2) 2
blinding (2) 2
communications protocols (2) 2
computer science, hardware & architecture (2) 2
computer science, software engineering (2) 2
encryption (2) 2
group signatures (2) 2
identity-based encryption (2) 2
players (2) 2
protocols (2) 2
unlinkable (2) 2
verification (2) 2
zertifikat (2) 2
affiliation‐hiding (1) 1
affilication-hiding (1) 1
anonymity analysis (1) 1
anonymous system (1) 1
anoymity (1) 1
attribute-based credentials (1) 1
authenticated key exchange (1) 1
authorized private set intersection (1) 1
bilinear pairings (1) 1
biometric information protection (1) 1
biometrics (1) 1
c plus plus language (1) 1
calculus (1) 1
certificates (1) 1
ciphertext search (1) 1
cloning (1) 1
cloning identity (1) 1
communication networks (1) 1
computer applications (1) 1
computer information security (1) 1
computer science, artificial intelligence (1) 1
construction (1) 1
consumers (1) 1
context (1) 1
convex polynomials (1) 1
convex polynomials u-conjecture unlinkable functions (1) 1
correlation (1) 1
correlation attack (1) 1
correlation attack-based cross-matching (1) 1
correlation-inequality (1) 1
cryptographic primitive (1) 1
cryptosystem (1) 1
customers (1) 1
data encryption chips (1) 1
data management (1) 1
data privacy (1) 1
data storage systems (1) 1
definitions (1) 1
denying clone user access (1) 1
design (1) 1
digital signatures (1) 1
e-cash (1) 1
efficient revocation (1) 1
electronic commerce (1) 1
elliptic curves (1) 1
empirical analysis (1) 1
engineering, electrical & electronic (1) 1
error-correction (1) 1
exchange (1) 1
expansion permutation (1) 1
fiat-shamir transformation (1) 1
fingerprint identification (1) 1
fingerprints (1) 1
fingers (1) 1
french rfid e-passport (1) 1
fuzzy (1) 1
fuzzy set theory (1) 1
gaussian measure (1) 1
geheimhaltung (1) 1
generic bilinear group model (1) 1
guruswami-sudan algorithm-based decoder (1) 1
hidden identity-based signatures (1) 1
härte (1) 1
identification (1) 1
identification of clone behavior/user (1) 1
information retrieval (1) 1
information science (1) 1
insider adversary (1) 1
internet (1) 1
intersection policy (1) 1
irreversibility requirement (1) 1
k-time authentication (1) 1
key agreement (1) 1
keys (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Lecture notes in computer science, ISSN 0302-9743, 2017, Volume 10322, pp. 3 - 20
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10343, pp. 281 - 300
Conference Proceeding
Security and Communication Networks, ISSN 1939-0114, 06/2013, Volume 6, Issue 6, pp. 723 - 734
ABSTRACT In CT‐RSA 2007, Jarecki, Kim, and Tsudik introduced the notion of affiliation‐hiding authenticated group key agreement (AH‐AGKA) protocols and... 
affiliation‐hiding | asymmetric group key agreement | authentication | Affiliation-hiding | Authentication | Asymmetric group key agreement | UNLINKABLE SECRET HANDSHAKES | SECURITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | affiliation-hiding | TELECOMMUNICATIONS | Secrecy aspects | Asymmetry | Security | Communication networks | Keys | Players
Journal Article
Key engineering materials, ISSN 1013-9826, 02/2011, Volume 467-469, Issue SUPPL.1, pp. 640 - 644
Affiliation-hiding authenticated key exchange protocol, also called secret handshake, makes two parties from the same organization realize mutual... 
Unlinkable | Affilication-hiding | RSA | Authenticated key exchange | Certificates | Privacy | Computer information security | Authentication | Organizations
Journal Article
Information Sciences, ISSN 0020-0255, 04/2020, Volume 516, pp. 158 - 191
Journal Article
Journal of Multivariate Analysis, ISSN 0047-259X, 2006, Volume 97, Issue 6, pp. 1355 - 1360
The celebrated U-conjecture states that under the N n ( 0 , I n ) distribution of the random vector X = ( X 1 , … , X n ) in R n , two polynomials P ( X ) and... 
U-conjecture | Convex polynomials | Unlinkable functions | convex polynomials | STATISTICS & PROBABILITY | unlinkable functions | CORRELATION-INEQUALITY | GAUSSIAN MEASURE | Convex polynomials U-conjecture Unlinkable functions
Journal Article
SCIENCE CHINA-INFORMATION SCIENCES, ISSN 1674-733X, 01/2020, Volume 63, Issue 2
Private mutual authentication (PMA) enables two-way anonymous authentication between two users certified by the same trusted group authority. Most existing PMA... 
SCHEME | private mutual authentication | secret handshake | UNLINKABLE SECRET HANDSHAKES | COMPUTER SCIENCE, INFORMATION SYSTEMS | multi-attribute matching | authorized private set intersection | intersection policy | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
ACM Transactions on Information and System Security (TISSEC), ISSN 1094-9224, 11/1999, Volume 2, Issue 4, pp. 354 - 389
We present a protocol for unlinkable serial transactions suitable for a variety of network-based subscription services. It is the first protocol to use... 
blinding | cryptographic protocols | anoymity | unlinkable serial transactions | Design | Anonymity | Verification | Security
Journal Article
2010 23rd IEEE Computer Security Foundations Symposium, ISSN 1063-6900, 07/2010, pp. 107 - 121
An attacker that can identify messages as coming from the same source, can use this information to build up a picture of targets' behaviour, and so, threaten... 
Context | Privacy | Protocols | Calculus | Mathematical model | Security | Radiofrequency identification
Conference Proceeding
Computer Journal, ISSN 0010-4620, 09/2014, Volume 57, Issue 10, pp. 1580 - 1590
The notion of Affiliation-Hiding Authenticated Group Key Agreement (AH-AGKA) protocols was first introduced by Jarecki et al. in CT-RSA 2007, where they... 
privacy | asymmetric group key agreement | authentication | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | UNLINKABLE SECRET HANDSHAKES | SECURITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS | EXCHANGE | IDENTITY-BASED ENCRYPTION
Journal Article
Computer Journal, ISSN 0010-4620, 12/2014, Volume 58, Issue 10, pp. 2509 - 2519
Affiliation-Hiding Authenticated Asymmetric Group Key Agreement (AH-AAGKA) protocol can be utilized by the members of a group to authenticate each other... 
key agreement | affiliation-hiding | authentication | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | UNLINKABLE SECRET HANDSHAKES | CONSTRUCTION | SECURITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS | IDENTITY-BASED ENCRYPTION | Asymmetry | Encryption | Players
Journal Article
2010 3rd International Conference on Computer Science and Information Technology, 07/2010, Volume 6, pp. 97 - 102
Hidden identity-based signatures (abbreviated as Hidden-IBS) can be seen as a variant of the traditional notion of group signatures. Compared with group... 
hidden identity-based signatures | unlinkable randomizable signatures | Σ-compiler | group signatures | Hidden identity-based signatures | Unlinkable randomizable signatures | σ-compiler | Group signatures
Conference Proceeding
1997, AD-a465 531.
We present a protocol for unlinkable serial transactions suitable for a variety of network-based subscription services. The protocol prevents the service from... 
subscriptions | communications protocols | cryptography | privacy | symposia | payment | consumers | anonymity | customers | vendors | internet | electronic commerce | unlinkable serial transactions
Government Document
1999, AD-a465 280.
We present a protocol for unlinkable serial transactions suitable for a variety of network-based subscription services. It is the first protocol to use... 
data management | cryptographic protocols | information retrieval | communications protocols | reprints | data storage systems | cryptography | operating systems(computers) | security | blinding | computer applications | anonymity | verification | unlinkable serial transactions
Government Document
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.