Virtual Identity Performance Evaluations of Anonymous Authentication in IDaaS Framework

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Two-Pass Anonymous Identity Authentication Using Smart Card

1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, *: corresponding author [email protected] 2,3 Department of Information Management, Nanhua University Chiayi 622 Taiwan, 2 [email protected] 3 [email protected] Tel: 886+ (0)5+272-1001 ext.56536 4 Institute of information systems and applications, National Tsing Hua University [email protected]...

متن کامل

Anonymous Authentication

In this paper, we study the seemingly paradoxical notion of anonymous authentication: authenticating yourself without revealing your identity. Before studying the technical aspects of anonymous Internet connections and anonymous authentication, we begin with a discussion of privacy and why it is important. Although the necessity of privacy is well accepted in the computer security community, th...

متن کامل

Multi-device Anonymous Authentication

Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed. The most prominent examples are Restricted Identification and Pseudonymous Signature schemes designed by the German Federal Office for Information Security for German personal identity cards. The main properties are that a user can authenticate himself with a single private key (s...

متن کامل

Anonymous Authentication for Smartcards

The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smartcard authentication. Currently the smartcards are used for many purposes e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without ou...

متن کامل

Anonymous Authentication of Membershipin Dynamic

We present a series of protocols for authenticating an in-dividual's membership in a group without revealing that individual's identity and without restricting how the membership of the group may be changed. In systems using these protocols a single message to the authenticator may be used by an individual to replace her lost key or by a trusted third party to add and remove members of the grou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2019

ISSN: 2169-3536

DOI: 10.1109/access.2019.2904854