How to maintain both privacy and authentication in digital libraries

被引:0
|
作者
Shahrokh Saeednia
机构
[1] Université Libre de Bruxelles,
[2] Département d’Informatique,undefined
[3] CP 212,undefined
[4] Boulevard du Triomphe,undefined
[5] 1050 Bruxelles,undefined
[6] Belgium,undefined
关键词
Key words: Digital library – Privacy – Key exchange – Authentication – Identity-based;
D O I
10.1007/PL00021469
中图分类号
学科分类号
摘要
In this paper, we first present a brief overview of two main network security problems related to digital libraries, privacy and authentication, and then we propose practical solutions to these problems which are applicable to digital libraries of any type and arbitrary size. More precisely, we propose a key exchange protocol and an identification scheme whose security is based on the difficulty of computing discrete logarithms and factoring large integers.
引用
收藏
页码:251 / 258
页数:7
相关论文
共 50 条
  • [21] LIBRARIES AND PRIVACY LEGISLATION
    HARTER, S
    BUSHA, C
    [J]. LIBRARY JOURNAL, 1976, 101 (03) : 475 - 481
  • [22] User-empowered secure privacy-preserving authentication scheme for Digital Twin
    Patel, Chintan
    Pasikhani, Aryan
    Gope, Prosanta
    Clark, John
    [J]. COMPUTERS & SECURITY, 2024, 140
  • [23] How to Make Privacy Policies both GDPR-Compliant and Usable
    Renaud, Karen
    Shepherd, Lynsay A.
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2018,
  • [24] How digital libraries can support e-learning
    Sharifabadi, Saeed Rezaei
    [J]. ELECTRONIC LIBRARY, 2006, 24 (03): : 389 - 401
  • [25] Society's Responsibility To Maintain Libraries
    Collijn, Isak G. A.
    [J]. LIBRARY JOURNAL, 1933, 58 (21) : 966 - 967
  • [26] HOW REFRAMING PRIVACY WOULD UPHOLD DEMOCRACY IN THE DIGITAL AGE
    Bartoletti, Ivana
    [J]. TURKISH POLICY QUARTERLY, 2021, 20 (04): : 129 - 136
  • [27] Building digital libraries: a how-to-do-it manual for libraries, 2nd edition
    Hadfield, Alana
    [J]. JOURNAL OF THE AUSTRALIAN LIBRARY AND INFORMATION ASSOCIATION, 2019, 68 (01): : 92 - 92
  • [28] How to protect privacy in Optimistic Fair Exchange of digital signatures
    Huang, Qiong
    Wong, Duncan S.
    Susilo, Willy
    [J]. INFORMATION SCIENCES, 2015, 325 : 300 - 315
  • [29] PRIVACY AND AUTHENTICATION - INTRODUCTION TO CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. PROCEEDINGS OF THE IEEE, 1979, 67 (03) : 397 - 427
  • [30] Privacy Enhanced Mobile Authentication
    G. M. Køien
    [J]. Wireless Personal Communications, 2007, 40 : 443 - 455