Sign in

Limits to Anonymity When Using Credentials.

Andreas PashalidisChris J. Mitchell
Published in: Security Protocols Workshop (2004)
Keyphrases
  • access control
  • privacy protection
  • private data
  • payment scheme
  • database
  • trust negotiation
  • ring signature scheme
  • neural network
  • distributed systems
  • privacy preserving
  • critical information
  • location privacy