Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Accumulators with applications to anonymity-preserving revocation
Membership revocation is essential for cryptographic applications, from traditional PKIs to
group signatures and anonymous credentials. Of the various solutions for the revocation …
group signatures and anonymous credentials. Of the various solutions for the revocation …
Practical UC-secure delegatable credentials with attributes and their application to blockchain
Certification of keys and attributes is in practice typically realized by a hierarchy of issuers.
Revealing the full chain of issuers for certificate verification, however, can be a privacy issue …
Revealing the full chain of issuers for certificate verification, however, can be a privacy issue …
DIV: Resolving the dynamic issues of zero-knowledge set membership proof in the blockchain
Zero-knowledge set membership (ZKSM) proof is widely used in blockchain to enable
private membership attestation. However, existing mechanisms do not fully consider …
private membership attestation. However, existing mechanisms do not fully consider …
Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities
Many Experts believe that the Internet of Things (IoT) is a new revolution in technology that
has brought many benefits for our organizations, businesses, and industries. However …
has brought many benefits for our organizations, businesses, and industries. However …
Credential-based authorization
Methods and systems are provided for demonstrating autho rization to access a resource to
a verifier computer control ling access to the resource. The method comprises, at a user …
a verifier computer control ling access to the resource. The method comprises, at a user …
Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents
The notion of domain-specific pseudonymous signatures (DSPS) has recently been
introduced for private authentication of ID documents, like passports, that embed a chip with …
introduced for private authentication of ID documents, like passports, that embed a chip with …
[HTML][HTML] Anonymous Access System with Limited Number of Uses in a Trustless Environment
This article proposes a novel method for managing usage counters within an anonymous
credential system, addressing the limitation of traditional anonymous credentials in tracking …
credential system, addressing the limitation of traditional anonymous credentials in tracking …
Strengthening authentication with privacy-preserving location verification of mobile phones
Mobile devices are increasingly used in security-sensitive contexts such as physical access
control and authorization of payment transactions. In this paper we contribute a mechanism …
control and authorization of payment transactions. In this paper we contribute a mechanism …
Privacy-Preserving Authentication: Theory vs. Practice
D Slamanig - arxiv preprint arxiv:2501.07209, 2025 - arxiv.org
With the increasing use of online services, the protection of the privacy of users becomes
more and more important. This is particularly critical as authentication and authorization as …
more and more important. This is particularly critical as authentication and authorization as …
Towards the development of a research agenda for cybercrime and cyberterrorism–identifying the technical challenges and missing solutions
Cybercrime and cyberterrorism research faces a number of challenges, such as the rate of
change in technology, field complexity and interdisciplinarity. This chapter aims at identifying …
change in technology, field complexity and interdisciplinarity. This chapter aims at identifying …