Anon-Pass: Practical Anonymous Subscriptions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

gap - Practical Anonymous Networking

This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based ...

متن کامل

Practical Revocable Anonymous Credentials

Currently, there are many solutions for authentication. Mostly, the authentication protocols based on traditional cryptographic constructions, such as digital signatures, hash functions and symmetric encryption schemes, are used. To provide more privacy protection, credential systems were introduced. Using these systems, users can anonymously prove that they possess some attributes. The attribu...

متن کامل

Practical Traceable Anonymous Identification

Internet privacy is of increasing interest, since online services are getting more and more ubiquitous and cover many aspects of one’s daily life. Hence users leave information tracks and disclose information during usage of services which can be compiled by third parties to infer users behavior, preferences etc. and thus may violate user’s privacy. In this paper we propose a practical method f...

متن کامل

Tipping Pennies ? Privately . Practical Anonymous

We design and analyze the first practical anonymous payment mechanisms for network services. We start by reporting on our experience with the implementation of a routing micropayment solution for Tor. We then propose micropayment protocols of increasingly complex requirements for networked services, such as p2p or cloud-hosted services. The solutions are efficient, with bandwidth and latency ov...

متن کامل

Practical Fair Anonymous Undeniable Signatures

We present a new model for undeniable signatures: fair-anonymous undeniable signatures. This protocol can not only preserve the privacy of the signer (i.e. anonymity) but also track the illegal utilization of the valid signatures. In addition, our model prevents the trusted centre from forging a valid signature for any signer. Keywords—Cryptography, Fair Anonymity, Information Security, RSA Sig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Security & Privacy

سال: 2014

ISSN: 1540-7993

DOI: 10.1109/msp.2013.158