Poster: arbitrators in the security infrastructure, supporting positive anonymity.
Shlomi DolevNiv GilboaOfer HermoniPublished in: CCS (2011)
Keyphrases
- ring signature scheme
- security properties
- information security
- trusted third party
- security requirements
- positive and negative
- security services
- access control
- public key infrastructure
- individual privacy
- statistical databases
- data collection
- highly distributed
- network security
- security issues
- security model
- identity management
- critical infrastructure
- data security
- security mechanisms
- payment systems
- privacy issues
- cryptographic protocols
- authentication protocol
- malware detection
- enterprise wide
- computing environments
- third party