Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,998,973 papers from all fields of science
Search
Sign In
Create Free Account
Digital credential
Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a Driver's license…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Algorithm
Blind credential
Blind signature
Computer access control
Expand
Broader (3)
Cryptography
E-commerce
Financial cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Post-Quantum EPID Group Signatures from Symmetric Primitives
D. Boneh
2018
Corpus ID: 4888990
Group signatures are used extensively for privacy in anonymous credentials schemes and in real-world systems for hardware enclave…
Expand
2018
2018
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs
Carlton Shepherd
,
Raja Naeem Akram
,
K. Markantonakis
arXiv.org
2018
Corpus ID: 195346175
Trusted Execution Environments (TEEs) are rapidly emerging as the go-to root of trust for protecting sensitive applications and…
Expand
2016
2016
An Effective Pseudonym Generating Scheme for Privacy and Anonymity in VANETs
Ling-ling Wang
,
G. Liu
,
Lijun Sun
,
Yue-Wei Lin
International Symposium on Artificial…
2016
Corpus ID: 17373879
Privacy and anonymity have become a critical issue for the deployment of vehicular ad hoc networks (VANETs). Pseudonym…
Expand
2013
2013
Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs
Nasima Begum
,
T. Nakanishi
,
N. Funabiki
Global Conference on Consumer Electronics
2013
Corpus ID: 40611305
To enhance the user privacy at authentications, an anonymous credential system has been designed to allow a user to anonymously…
Expand
2012
2012
A calculus for privacy-friendly authentication
Patrik Bichsel
,
J. Camenisch
,
Dieter Sommer
ACM Symposium on Access Control Models and…
2012
Corpus ID: 18132825
Establishing authentic channels has become a common operation on the Internet and electronic commerce would not be possible…
Expand
2011
2011
Research on security mechanism for Multi-Agent system
Wang Xuan
,
Jing Yan
IEEE International Conference on Communication…
2011
Corpus ID: 17028144
Multi-Agent system can be seen as societies whose individuals and software agents acting on behalf of their owner(people or…
Expand
2010
2010
Measuring the user's anonymity when disclosing personal properties
K. Verslype
,
B. De Decker
MetriSec '10
2010
Corpus ID: 14264594
Anonymous credentials allow to selectively disclose personal properties included in the credential, while hiding the other…
Expand
2007
2007
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
O. Cetinkaya
,
A. Doganaksoy
ARES
2007
Corpus ID: 16637679
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now…
Expand
2006
2006
Access control in a privacy-aware eLearning environment
Elke Franz
,
Hagen Wahrig
,
Alexander Böttcher
,
K. Borcea-Pfitzmann
ARES
2006
Corpus ID: 6694602
Access control is necessary to prevent illegal accesses to shared resources. Within eLearning, access control is required in…
Expand
2005
2005
Unlinkability through Access Control: Respecting User-Privacy in Distributed Systems
Apu Kapadia
,
P. Naldurg
,
R. Campbell
2005
Corpus ID: 56372753
We propose a policy-based framework using RBAC (Role Based Access Control) to address the unlinkability problem in the context of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE