• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats.

Miroslaw KutylowskiLucjan HanzlikKamil Kluczniak
Published in: ACISP (2) (2016)
Keyphrases
  • privacy issues
  • security issues
  • privacy preserving
  • information security
  • private information
  • security risks
  • database
  • efficient implementation
  • privacy preserving data mining
  • digital signature
  • trusted third party