A practical implementation of veiled certificate for user-centric privacy protection

  • Authors:
  • Will Goss;Chin-Tser Huang

  • Affiliations:
  • Columbia, SC;Columbia, SC

  • Venue:
  • Proceedings of the 50th Annual Southeast Regional Conference
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We describe an implementation of the veiled certificate for providing user-centric privacy protection. This description gives details on the process of cryptographic algorithm selection, the execution and design of the selected algorithm.