A secure system for data access based on anonymous authentication and time-dependent hierarchical keys.
Wen-Guey TzengPublished in: AsiaCCS (2006)
Keyphrases
- data access
- private key
- key agreement
- data management
- authentication scheme
- trusted platform module
- secret key
- user authentication
- key distribution
- data confidentiality
- data sharing
- authentication protocol
- security mechanisms
- electronic payment
- security analysis
- public key
- database applications
- factor authentication
- data transfer
- diffie hellman
- security requirements
- data objects
- key management
- sql server
- encryption scheme
- digital signature
- signature scheme
- trusted computing
- hash functions
- database management systems
- data mining
- smart card
- database
- sensitive data
- rfid tags
- visual basic