Fast revocation of attribute-based credentials for both users and verifiers.
Wouter LueksGergely AlpárJaap-Henk HoepmanPim VullersPublished in: Comput. Secur. (2017)
Keyphrases
- access control
- end users
- user interaction
- user requirements
- recommender systems
- social media
- user interface
- user groups
- user generated content
- user profiles
- user experience
- daily life
- information access
- information overload
- internet users
- user centric
- social networking sites
- user model
- mobile phone
- collaborative filtering