Authentication without Identification.

Many authentication transactions performed today require us to disclose more information than is strictly needed, just for verification purposes. Fortunately, modern cryptography provides us with a way to solve the verification problem without leaking unnecessary personal information. These techniqu...

全面介紹

書目詳細資料
發表在:IEEE Security and privacy : building confidence in a networked world 5, 3 (2007).
主要作者: Lysyanskaya, A.
格式: Article
語言:English