Attribute-based anonymous credential: Delegation, traceability, and revocation.
Peng LiJunzuo LaiYe YangMeng SunChi WuWei WuXiaowei YuanPublished in: Comput. Networks (2023)
Keyphrases
- access control
- role based access control
- security policies
- access control systems
- access control policies
- data security
- software architecture
- life cycle
- payment scheme
- security requirements
- security model
- security mechanisms
- identity management
- peer to peer
- trust management
- trust negotiation
- digital signature scheme
- trusted platform module