Essays about: "Anonymous authentication"
Found 3 essays containing the words Anonymous authentication.
-
1. Privacy-preserving Authentication in Participatory Sensing Systems : An attribute based authentication solution with sensor requirement enforcement.
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Participatory Sensing Systems (PSS) are a type of Mobile Crowdsensing System where users voluntarily participate in contributing information. Task initiators create tasks, targeting specific data that needs to be gathered by the users’ device sensors. READ MORE
-
2. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE
-
3. Anonymous Authentication Using Secure Multi-Party Computations
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Typical authentication systems provide a method to allow registered users access to protected resources after the user successfully authenticates. A user successfully authenticates by proving his or her valid identity if he or she is a registered user. READ MORE