Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,357,978 papers from all fields of science
Search
Sign In
Create Free Account
Digital credential
Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a Driver's license…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Algorithm
Blind credential
Blind signature
Computer access control
Expand
Broader (3)
Cryptography
E-commerce
Financial cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Fair and Privacy-preserving Reservation Scheme for Charging Electric Vehicles
Khaled Rabieh
,
A. Aydogan
International Symposium on Networks, Computers…
2019
Corpus ID: 208209778
Enormous benefits are expected from Electric Vehicle (EV) which is a promising alternative to replace traditional gasoline car…
Expand
2018
2018
Post-Quantum EPID Group Signatures from Symmetric Primitives
D. Boneh
2018
Corpus ID: 4888990
Group signatures are used extensively for privacy in anonymous credentials schemes and in real-world systems for hardware enclave…
Expand
2018
2018
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs
Carlton Shepherd
,
Raja Naeem Akram
,
K. Markantonakis
arXiv.org
2018
Corpus ID: 195346175
Trusted Execution Environments (TEEs) are rapidly emerging as the go-to root of trust for protecting sensitive applications and…
Expand
2015
2015
Injecting Subject Policy into Access Control for Strengthening the Protection of Personal Information
H. Mun
,
Sejong Oh
Wireless personal communications
2015
Corpus ID: 207262998
To protect stored personal information, many organizations and information systems adopt the role-based access control model…
Expand
2013
2013
Privacy and accountability in identity systems: the best of both worlds
Christian Paquin
2013
Corpus ID: 6585255
Privacy and accountability are widely believed to be opposing goals in identity systems. On one hand, service providers require…
Expand
2011
2011
Enhancing usability of privacy-respecting authentication and authorization in mobile social settings by using Idemix : (in the context of the EU FP7 di.me Project)
Mohamed Bourimi
,
M. Heupel
,
D. Kesdogan
,
Thomas Fielenbach
2011
Corpus ID: 55304371
Authentication and authorization are an essential part of any system allowing for information sharing and social interaction…
Expand
2011
2011
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model
Sébastien Canard
,
Roch Lescuyer
,
Jacques Traoré
Cryptology and Network Security
2011
Corpus ID: 31326134
Anonymous credential systems allow users to obtain a certified credential (a driving license, a student card, etc.) from one…
Expand
2009
2009
A Remote Anonymous Attestation Scheme with Improved Privacy CA
Liu Lixin
,
Li Chaoling
,
Zhou Yanzhou
International Conference on Multimedia…
2009
Corpus ID: 15123956
Trusted Computing Group developed two solutions to realize remote attestation between platforms, but both of them have drawbacks…
Expand
2005
2005
Unlinkability through Access Control: Respecting User-Privacy in Distributed Systems
Apu Kapadia
,
P. Naldurg
,
R. Campbell
2005
Corpus ID: 56372753
We propose a policy-based framework using RBAC (Role Based Access Control) to address the unlinkability problem in the context of…
Expand
1997
1997
Anonymous Credentials in Kerberos
Ari Medvinsky
,
Matt Hur
1997
Corpus ID: 201889090
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE