نتایج جستجو برای: untraceability

تعداد نتایج: 141  

Journal: :IEEE Access 2021

The Wireless Body Area Network (WBAN) plays a pivotal role in providing ubiquitous computing and has applications different fields, especially health monitoring. advancement wearable devices revolutionized the concept of medical services brought ease to our daily lives. However, latent threat imposed by attackers increased concerns related security privacy patient’s data due open nature wireles...

2002
Sang Yun Park Moon Seog Han

The anticipated increase in mobility and popular use of the mobile services will require more technologies for authenticating mobile hosts and protecting their privacy. However, the issues such as privacy and confidentiality in mobile computing environments and the resource restriction of mobile hosts have not been given enough consideration. In this paper, we present an authentication protocol...

Journal: :Fundam. Inform. 2003
Cheng-Chi Lee Wei-Pang Yang Min-Shiang Hwang

Abstract. With the help of a blind signature scheme, a requester can obtain a signature on a message from a signer such that the signer knows nothing about the content of the messages and is unable to link the resulting message-signature pair; namely, a blind signature scheme can achieve both blindness and untraceability. Due to the above properties, the blind signature scheme can be used in cr...

1996
Larry T. Chen Tatsuya Suda

This article examines the impact of mobile computing on the design of distributed object systems. The de ning characteristics of mobile computing, such as the frequent movement of users and hosts, the scarcity of network and local computing resources available to the mobile host, and the possibility of disconnections, present di cult challenges in providing a highly-available distributed object...

2016
Khaled Ouafi

Privacy is a major concern in RFID systems, especially with widespread deployment of wireless-enabled interconnected personal devices e.g. PDAs and mobile phones, credit cards, e-passports, even clothing and tires. An RFID authentication protocol should not only allow a legitimate reader to authenticate a tag but it should also protect the privacy of the tag against unauthorized tracing: an adv...

2006
Magdalena Payeras-Capellà Josep Lluís Ferrer-Gomila Llorenç Huguet i Rotger

An electronic purchase is an essential operation of electronic commerce. Fairness in the exchange of money and product, as well as anonymity of the buyer, are desirable features. In Asiacrypt 2003, C.H. Wang [8] presented a purchase protocol satisfying both anonymity and fairness, adapting the anonymous payment system of Brands [2], using a restrictive confirmation signature scheme. Later, In A...

2008
Karim El Defrawy

In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings, node identities must not be exposed and node movements must be untraceable. Instead, nodes need to communicate on the basis of nothing more than their current locations. In this paper, we address some interesting issues...

2012
Panayiotis Kotzanikolaou Emmanouil Magkos Nikolaos Petrakos Christos Douligeris Vassilios Chrissikopoulos

We propose an efficient anonymous authentication scheme that provides untraceability and unlinkability of mobile devices, while accessing Location-Based Services. Following other recent approaches for mobile anonymity, in our scheme the network operator acts as an anonymous credential issuer for its users. However, our scheme supports credential non-transferability, without requiring embedded h...

Journal: :I. J. Network Security 2016
Bhawani Shanker Bhati Pallapa Venkataram

We consider the problem of preserving node’s location privacy which is essential for minimizing the attacks during multi-hop routing in MANETs. As by intercepting and analyzing the transmitted packets, intermediate nodes (conventionally, assumed to be trustworthy) can track sender and receiver nodes, and can also trace the route between them. Earlier approaches attempts to preserve the location...

2012
Naipeng Dong Hugo Jonker Jun Pang

Given the sensitive nature of health data, security and privacy of eHealth systems is of prime importance. Properties like secrecy, authentication, anonymity, and untraceability need to be satisfied. However, only satisfying these properties is not sufficient in case users can reveal private information to the adversary. For instance, a pharmaceutical company may bribe or coerce a pharmacist to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید