Login / Signup
Limits to Anonymity When Using Credentials.
Andreas Pashalidis
Chris J. Mitchell
Published in:
Security Protocols Workshop (2004)
Keyphrases
</>
access control
privacy protection
private data
payment scheme
database
trust negotiation
ring signature scheme
neural network
distributed systems
privacy preserving
critical information
location privacy