2001
DOI: 10.1007/0-306-46998-7_1
|View full text |Cite
|
Sign up to set email alerts
|

PyTHIA: Towards Anonymity in Authentication

Abstract: There is a scale between authentication and anonymity, which is currently leaning towards the side of authentication, when it comes to e-commerce. Service providers and merchants are usually keeping track of user-related information in order to construct behavioural profiles of their customers. Service providers and merchants also correlate profiles of this kind, stemming from different sources, in order to increase their profit. This correlation is usually performed with the use of Unified Codes. Authenticati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…In Section 4 we present our proposal for a more user-transparent CSI mechanism based on Software Agents, along with a comparative evaluation of our mechanism to the already proposed ones. An earlier version of the work presented in Section 4 has been published in (Iliadis, Gritzalis and Gritzalis 2003) while some of the mechanisms for securing the operation of ADoCSI (Section 4.3.5) have been published in (Gritzalis, Moulinos, Iliadis et al 2001), (Gritzalis and Iliadis 1998) and (Iliadis, Gritzalis and Oikonomou 1998).…”
Section: Thesis Outlinementioning
confidence: 99%
See 3 more Smart Citations
“…In Section 4 we present our proposal for a more user-transparent CSI mechanism based on Software Agents, along with a comparative evaluation of our mechanism to the already proposed ones. An earlier version of the work presented in Section 4 has been published in (Iliadis, Gritzalis and Gritzalis 2003) while some of the mechanisms for securing the operation of ADoCSI (Section 4.3.5) have been published in (Gritzalis, Moulinos, Iliadis et al 2001), (Gritzalis and Iliadis 1998) and (Iliadis, Gritzalis and Oikonomou 1998).…”
Section: Thesis Outlinementioning
confidence: 99%
“…Another way to minimise the risk of compromised CA-CSI Agents without requiring them to contact CA-CSI Agents on other AMPs would be to have them use reverse hash chains (Gritzalis, Moulinos et al 2001;Jingfeng, Yuefei, Heng et al 2005). CA-CSI Agents' certificates should contain the initial hash value IV (IV=Hashz(pseudorandomjnumber), where z is the maximum number of validity periods of the CA-CSI Agent) of a hash chain and give out to User-CSI Agents the current period's validity value r (r=Hash>'"z(7V)/ where y is the serial number of the current validity period) and CA's should "refresh" the CA-CSI Agents when validity period is over.…”
Section: Unauthorised Modification or Replacement Of Agentsmentioning
confidence: 99%
See 2 more Smart Citations