Authentication without Identification.

Many authentication transactions performed today require us to disclose more information than is strictly needed, just for verification purposes. Fortunately, modern cryptography provides us with a way to solve the verification problem without leaking unnecessary personal information. These techniqu...

Celý popis

Podrobná bibliografie
Vydáno v:IEEE Security and privacy : building confidence in a networked world 5, 3 (2007).
Hlavní autor: Lysyanskaya, A.
Médium: Článek
Jazyk:English