Anonymity and security support for persistent enterprise conversation

被引:0
|
作者
Wang, Changjie [1 ]
Chiu, Dickson K. W. [1 ]
Leung, Ho-fung [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Sha Tin 100083, Hong Kong, Peoples R China
关键词
anonymity; privacy protection; cryptograph; anonymity revocation; alias certificates; verifiability;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Persistent conversation has emerged and become the basis of many Web communities nowadays. It is also widely used in e-commerce and extended enterprises. The registration procedures for the users of most Web communities are unreliable and can be easily compromised. In this paper, we propose an anonymous and secure conversation protocol based on a concept of alias certificate with analysis to show that our scheme satisfies such requirements.
引用
下载
收藏
页码:471 / 474
页数:4
相关论文
共 50 条
  • [41] Security 360°: Enterprise security for the cognitive era
    Rao, J. R.
    Chari, S. N.
    Pendarakis, D.
    Sailer, R.
    Stoecklin, M. Ph.
    Teiken, W.
    Wespi, A.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2016, 60 (04)
  • [42] Understanding the scientific enterprise - A conversation with Alan Leshner
    Perkins-Gough, Deborah
    EDUCATIONAL LEADERSHIP, 2006, 64 (04) : 8 - 15
  • [43] A Decade of Enterprise Integration Patterns A Conversation with the Authors
    Zimmermann, Olaf
    Pautasso, Cesare
    Hohpe, Gregor
    Woolf, Bobby
    IEEE SOFTWARE, 2016, 33 (01) : 13 - 19
  • [44] Security Flaws in Authentication Protocols with Anonymity for Wireless Environments
    Xu, Jing
    Feng, Dengguo
    ETRI JOURNAL, 2009, 31 (04) : 460 - 462
  • [45] Security analysis of authentication scheme with anonymity for wireless environments
    Wei, Yongzhuang
    Qiu, Hongbing
    Hu, Yupu
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 535 - +
  • [46] POSTER: Arbitrators in the Security Infrastructure, Supporting Positive Anonymity
    Dolev, Shlomi
    Gilboa, Niv
    Hermoni, Ofer
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 753 - 755
  • [47] Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity
    Garman, Christina
    Green, Matthew
    Miers, Ian
    Rubin, Aviel D.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 140 - 155
  • [48] LSB: A Lightweight Scalable Blockchain for IoT security and anonymity
    Dorri, Ali
    Kanhere, Salil S.
    Jurdak, Raja
    Gauravaram, Praveen
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 134 : 180 - 197
  • [49] Anonymity and security improvements in heterogeneous connected vehicle networks
    Sivasankari, S. A.
    Gupta, Deepak
    Keshta, Ismail
    Reddy, Ch. Venkata Krishna
    Singh, Pavitar Parkash
    Byeon, Haewon
    INTERNATIONAL JOURNAL OF DATA SCIENCE AND ANALYTICS, 2024,
  • [50] Business Information Exchange System with Security, Privacy, and Anonymity
    Muftic, Sead
    bin Abdullah, Nazri
    Kounelis, Ioannis
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016