• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,054
Next 10 →

Self-blindable credential certificates from the weil pairing

by Eric R. Verheul , 2001
"... Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The second system provides cryptographic protection against the forgery and transfer of credentials. Both systems are based ..."
Abstract - Cited by 56 (1 self) - Add to MetaCart
Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The second system provides cryptographic protection against the forgery and transfer of credentials. Both systems are based

GroupLens: An Open Architecture for Collaborative Filtering of Netnews

by Paul Resnick, Neophytos Iacovou, Mitesh Suchak, Peter Bergstrom, John Riedl , 1994
"... Collaborative filters help people make choices based on the opinions of other people. GroupLens is a system for collaborative filtering of netnews, to help people find articles they will like in the huge stream of available articles. News reader clients display predicted scores and make it easy for ..."
Abstract - Cited by 1548 (41 self) - Add to MetaCart
pseudonyms, without reducing the effectiveness of the score prediction. The entire architecture is open: alternative software for news clients and Better Bit Bureaus can be developed independently and can interoperate with the components we have developed.

Pseudonym Systems

by Anna Lysyanskaya , 1999
"... Pseudonym systems allow users to interact with multiple organizations anonymously, using pseudonyms. The pseudonyms cannot be linked, but are formed in such a way that a user can prove to one organization a statement about his relationship with another. Such statement is called a credential. Previou ..."
Abstract - Cited by 144 (10 self) - Add to MetaCart
Pseudonym systems allow users to interact with multiple organizations anonymously, using pseudonyms. The pseudonyms cannot be linked, but are formed in such a way that a user can prove to one organization a statement about his relationship with another. Such statement is called a credential

An efficient system for non-transferable anonymous credentials with optional anonymity revocation

by Jan Camenisch, Anna Lysyanskaya , 2001
"... A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance ..."
Abstract - Cited by 308 (13 self) - Add to MetaCart
A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance

Separating key management from file system security

by David Mazieres, Michael Kaminsky, M. Frans Kaashoek, Emmett Witchel , 1999
"... No secure network file system has ever grown to span the In-ternet. Existing systems all lack adequate key management for security at a global scale. Given the diversity of the In-ternet, any particular mechanism a file system employs to manage keys will fail to support many types of use. We propose ..."
Abstract - Cited by 229 (28 self) - Add to MetaCart
keys, SFS file names effectively contain public keys, making them self-certifying pathnames. Key manage-ment in SFS occurs outside of the file system, in whatever procedure users choose to generate file names. Self-certifying pathnames free SFS clients from any notion of administrative realm, making

Pseudonym Systems (Extended Abstract)

by Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf , 1999
"... Pseudonym systems allow users to interact with multiple organizations anonymously, using pseudonyms. The pseudonyms cannot be linked, but are formed in such away that a user can prove to one organization a statement about his relationship with another. Such a statement is called a credential. Previ ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Pseudonym systems allow users to interact with multiple organizations anonymously, using pseudonyms. The pseudonyms cannot be linked, but are formed in such away that a user can prove to one organization a statement about his relationship with another. Such a statement is called a credential

The SPARTA Pseudonym and Authorization System

by G. Bianchi, M. Bonola, V. Falletta, F. S. Proto, S. Teofili
"... This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may want to control in first place the user accessing its resources, i.e., without being forced to delegate the management o ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
. The framework described in this paper aims at coping with these two opposite needs. This is accomplished through i) a distributed third-party-based instrastructure devised to assign and manage pseudonym certificates, decoupled from ii) a two-party procedure, devised to bind an authorization permission to a

A Pseudonymity System for Grids

by Joni Hahkala, Henri Mikkonen, Mika Sil, John White
"... Abstract—Traditionally, Grid users have been identifiable and traceable beyond reasonable doubt by their digital certificates. However, Grids are used in an ever-increasing variety of contexts and thus, the number of usage scenarios has augmented accordingly. In bio-medicine and other health-related ..."
Abstract - Add to MetaCart
the development process of a new medicine by anonymizing the accesses to medical research databases. In this paper we identify the requirements and define an architecture for pseudonymity system addressing these needs. Also the protocols used between the components are defined.

Modern Credential Access Control Approach Based On Pseudonymous Signature

by Faiz Ahmad, Rajesh Jalnekar
"... This paper proposes a modern credential access control approach which allows the organizations to provide their resources/services on the internet and grant access rights to users by employing Cryptographic Pseudonymous Signature. The concepts of Modern Credentials and Pseudonymous Signature are pro ..."
Abstract - Add to MetaCart
This paper proposes a modern credential access control approach which allows the organizations to provide their resources/services on the internet and grant access rights to users by employing Cryptographic Pseudonymous Signature. The concepts of Modern Credentials and Pseudonymous Signature

Commission on Teacher Credentialing

by Mary Vixie Sandy , 2012
"... Credentialing (Commission) to restore the application processing fee to the statutory limit of $70.00 (reference Education Code §44235) and increase testing fees by 5 % effective July 1, 2012. Key Provisions: Application Processing Fees The CTC Online system was updated on July 1, 2012 to reflect th ..."
Abstract - Add to MetaCart
Credentialing (Commission) to restore the application processing fee to the statutory limit of $70.00 (reference Education Code §44235) and increase testing fees by 5 % effective July 1, 2012. Key Provisions: Application Processing Fees The CTC Online system was updated on July 1, 2012 to reflect
Next 10 →
Results 1 - 10 of 1,054
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University