Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Affiliation-Hiding Authentication (AHA) protocols have the seemingly contradictory property of enabling users to authenticate each other as members of ...
Abstract. Affiliation-Hiding Authentication (AHA) protocols have the seemingly contradictory property of enabling users to authenticate each.
Aug 9, 2017 · Abstract. Affiliation-Hiding Authentication (AHA) protocols have the seemingly contradictory property of enabling users to authenticate each.
A new AHA protocol running in O(n log n) time is introduced, a major step towards deployment of privacy-preserving methods in constraint devices, ...
Affiliation-Hiding Authentication (AHA) protocols have the seemingly contradictory property of enabling users to authenticate each other as members of ...
Mark Manulis , Bertram Poettering: Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. WISTP 2011: 85-99. manage site settings.
Affiliation-hiding authentication with minimal bandwidth consumption · Mark Manulis · ORCID. RUB Icon. , · Bertram Poettering. RUB Icon.
If the players re-use their certificates, the protocols are affiliation-hiding but it's possible to trace multiple occurrences of the same party. In this ...
Missing: Consumption. | Show results with:Consumption.
while affiliation-hiding protocols, as we show here, can be achieved at seemingly minimal expense, and thus it is important to understand the exact privacy ...
Abstract. Among the plethora of privacy-friendly authentication techniques, affiliation- hiding (AH) protocols are valuable for their ability to hide not ...