Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Demonstrating that a public predicate can be satisfied without revealing any information about how
Proceedings on Advances in cryptology---CRYPTO '86
Membership authentication for hierarchical multigroups using the extended Fiat-Shamir scheme
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Privacy enhancing identity management: protection against re-identification and profiling
Proceedings of the 2005 workshop on Digital identity management
Multilateral Secure Cross-Community Reputation Systems for Internet Communities
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Privacy Preserving Data Mining within Anonymous Credential Systems
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Leak-free mediated group signatures
Journal of Computer Security
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Provision of trusted identity management using trust credentials
iTrust'06 Proceedings of the 4th international conference on Trust Management
Single password authentication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
It is becoming increasingly easy and common for organizations to routinely exchange data on individuals. Because each individual provides most organizations essentially the same uniquely identifying information, such, as social security number, or name, age and place of birth, the records held by one organization on an individual are readily matched or linked with those held by other organizations. Thus, organizations are capable of exchanging information about individuals whenever and to whatever extent they choose. Clearly some such transfers of information are quite useful and beneficial to society. The problems stem from the inability of anyone, particularly the individuals whose data is involved, to control or even effectively monitor such transfers. These problems were not present in completely paper based systems, where the transfer of information about an individual was only through credential documents issued to the individual by one organization and shown by the individual to other organizations.