Group-Based Private Authentication
暂无分享,去创建一个
Levente Buttyán | István Vajda | Gildas Avoine | Tamás Holczer | L. Buttyán | I. Vajda | T. Holczer | Gildas Avoine
[1] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[2] Levente Buttyán,et al. Optimal Key-Trees for Tree-Based Private Authentication , 2006, Privacy Enhancing Technologies.
[3] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[4] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[5] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[6] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.