Skip to search formSkip to main contentSkip to account menu

Forward anonymity

Known as: Perfect forward anonymity, Forwards anonymity, Reverse anonymity 
Forward anonymity, analogous to forward secrecy, in computer security and cryptography is the property which prevents an attacker who has recorded… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2021
2021
In this work we develop a privacy-preserving reputation scheme for collaborative systems such as P2P networks in which peers can… 
2019
2019
The three-party (two clients and one server) authenticated key exchange protocols use a pre-shared password to authenticate each… 
2017
2017
Recently, the use of smart cards in human life is increasing. One important aspect in implementing smart cards in human life is… 
2016
2016
Dynamic ID-based authentication solves the ID-theft problem by changing the ID in each session instead of using a fixed ID while… 
2016
2016
The emergence of resource-rich mobile devices and smart vehicles has paved the way for Urban Sensing. In this new paradigm, users… 
2015
2015
Direct Anonymous Attestation (DAA) is a signature scheme that provides a balance between user privacy and authentication in a… 
Review
2011
Review
2011
We LiVe iN an era of data abundance. Every aspect of our online and offline behavior—every click on a Web site, every… 
Review
2008
Review
2008
Purpose – This paper aims to propose an anonymous web‐browsing protocol that harnesses some of the advantages of store‐and…