Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Protection Based on Neighborhood-Trust in Clustered Wireless Mesh Networks
NGMAST '09 Proceedings of the 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Attribute-based signature and its applications
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Universal authentication protocols for anonymous wireless communications
IEEE Transactions on Wireless Communications
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Efficient attribute-based signatures for non-monotone predicates in the standard model
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Revocable attribute-based signatures with adaptive security in the standard model
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Privacy issues in vehicular ad hoc networks
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Short attribute-based signatures for threshold predicates
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
SLAB: A secure localized authentication and billing scheme for wireless mesh networks
IEEE Transactions on Wireless Communications
Hi-index | 0.00 |
Authentication is a procedure by which a client convinces the service provider about a claimed property under a given authentication policy. Anonymous authentication has an added property: protect the real identity of the client. In this paper, we study the situations with dynamic authentication policies, commonly seen in large scale systems such as cloud computing. While this is not a significant issue for classic authentication where client anonymity is not a concern, it will introduce an array of difficulties to anonymous authentication which have not been formally investigated. To address this issue, we propose the notion of SA^3: Self-Adaptive Anonymous Authentication. The related models are presented together with a generic design from attribute-based signatures.