A course in number theory and cryptography
A course in number theory and cryptography
KQML as an agent communication language
Software agents
Agent-mediated electronic commerce: issues, challenges and some viewpoints
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Personal security agent: KQML-based PKI
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Zero Knowledge Watermark Detection
IH '99 Proceedings of the Third International Workshop on Information Hiding
On Defining Proofs of Knowledge
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Batching Proofs of Knowledge and its Applications
DEXA '99 Proceedings of the 10th International Workshop on Database & Expert Systems Applications
A Practically Implementable and Tractable Delegation Logic
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Security and Privacy Using One-Round Zero-Knowledge Proofs
CEC '05 Proceedings of the Seventh IEEE International Conference on E-Commerce Technology
Hi-index | 0.00 |
Trust in semantic web is established by either credentials or reputation. Credential-based trust protocols assume the possession of credentials and transfer them between parties in order to establish trust. Since credentials can be private data, the act of providing private credentials implies poor privacy management even if transferred through secure (encrypted) channels. Exchanging private credentials is a major risk in critical applications since it eases unauthorized usage of private data. This paper presents a framework for safe trust protocols that interactively proves the possession of credentials without the need of exchanging them.