Login / Signup
How to Bypass Two Anonymity Revocation Schemes.
George Danezis
Len Sassaman
Published in:
Privacy Enhancing Technologies (2008)
Keyphrases
</>
electronic cash
payment scheme
blind signature
trusted third party
provably secure
real time
credit card
privacy protection
third party
access control
smart card
key management
location privacy
database systems
information systems
payment systems
neural network
data sets