2015
DOI: 10.13189/ujcn.2015.030403
|View full text |Cite
|
Sign up to set email alerts
|

Security Protocols with Privacy and Anonymity of Users

Abstract: Security is very important for many Internet and mobile applications, but with the recent proliferation of tracking and profiling of users and unauthorized distribution of their personal data, user privacy is also becoming a very important issue. In addition, new technologies are introducing the possibility of innovative applications that require user anonymity. Privacy means that user identities and transactions are revealed and known only to transaction partners and only during the execution of the transacti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
(16 reference statements)
0
1
0
Order By: Relevance
“…When analyzing publications on cryptography, many discussions address privacy preservation techniques [80]. As preventing the leakage and the theft of user information emerged as critical problems in the digital world, privacy preservation techniques received more attention, including anonymous signature schemes like group and ring signatures [7].…”
Section: Identifying Signers In Group Signatures and Ring Signaturesmentioning
confidence: 99%
“…When analyzing publications on cryptography, many discussions address privacy preservation techniques [80]. As preventing the leakage and the theft of user information emerged as critical problems in the digital world, privacy preservation techniques received more attention, including anonymous signature schemes like group and ring signatures [7].…”
Section: Identifying Signers In Group Signatures and Ring Signaturesmentioning
confidence: 99%