Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,570 papers from all fields of science
Search
Sign In
Create Free Account
Digital credential
Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a Driver's license…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Algorithm
Blind credential
Blind signature
Computer access control
Expand
Broader (3)
Cryptography
E-commerce
Financial cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Fair and Privacy-preserving Reservation Scheme for Charging Electric Vehicles
Khaled Rabieh
,
A. Aydogan
International Symposium on Networks, Computers…
2019
Corpus ID: 208209778
Enormous benefits are expected from Electric Vehicle (EV) which is a promising alternative to replace traditional gasoline car…
Expand
2018
2018
Post-Quantum EPID Group Signatures from Symmetric Primitives
D. Boneh
2018
Corpus ID: 4888990
Group signatures are used extensively for privacy in anonymous credentials schemes and in real-world systems for hardware enclave…
Expand
2015
2015
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs
Liqun Chen
,
Qin Li
,
K. Martin
,
S. Ng
IET Information Security
2015
Corpus ID: 18136930
An announcement scheme is a system that facilitates vehicles to broadcast road-related information in vehicular ad hoc networks…
Expand
2013
2013
Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs
Nasima Begum
,
T. Nakanishi
,
N. Funabiki
Global Conference on Consumer Electronics
2013
Corpus ID: 40611305
To enhance the user privacy at authentications, an anonymous credential system has been designed to allow a user to anonymously…
Expand
2012
2012
A calculus for privacy-friendly authentication
Patrik Bichsel
,
J. Camenisch
,
Dieter Sommer
ACM Symposium on Access Control Models and…
2012
Corpus ID: 18132825
Establishing authentic channels has become a common operation on the Internet and electronic commerce would not be possible…
Expand
2011
2011
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model
Sébastien Canard
,
Roch Lescuyer
,
Jacques Traoré
Cryptology and Network Security
2011
Corpus ID: 31326134
Anonymous credential systems allow users to obtain a certified credential (a driving license, a student card, etc.) from one…
Expand
2010
2010
Measuring the user's anonymity when disclosing personal properties
K. Verslype
,
B. De Decker
MetriSec '10
2010
Corpus ID: 14264594
Anonymous credentials allow to selectively disclose personal properties included in the credential, while hiding the other…
Expand
2007
2007
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
O. Cetinkaya
,
A. Doganaksoy
ARES
2007
Corpus ID: 16637679
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now…
Expand
2007
2007
The e-Government digital credentials
F. Corradini
,
Eleonora Paganelli
,
A. Polzonetti
2007
Corpus ID: 145102078
Digital identities, profiles and their management enable online interactions and transactions among people, enterprises, service…
Expand
2006
2006
Access control in a privacy-aware eLearning environment
Elke Franz
,
Hagen Wahrig
,
Alexander Böttcher
,
K. Borcea-Pfitzmann
ARES
2006
Corpus ID: 6694602
Access control is necessary to prevent illegal accesses to shared resources. Within eLearning, access control is required in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE