Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fast revocation of attribute-based credentials for both users and verifiers
Attribute-based credentials allow a user to prove properties about herself anonymously.
Revoking such credentials, which requires singling them out, is hard because it is at odds …
Revoking such credentials, which requires singling them out, is hard because it is at odds …
Securing transactions with the eIDAS protocols
F Morgner, P Bastian, M Fischlin - … Security Theory and Practice: 10th IFIP …, 2016 - Springer
The proposed European system for electronic identities, authentication, and trust services
(eIDAS) enables remote authentication of an identity card (and selected data of the card) to …
(eIDAS) enables remote authentication of an identity card (and selected data of the card) to …
[BOEK][B] Security and Privacy via Cryptography Having your cake and eating it too
W Lueks - 2017 - repository.ubn.ru.nl
Digital technologies play an ever-increasing role in our daily lives. However, these
technologies are also frequently data driven. Governments and companies alike collect …
technologies are also frequently data driven. Governments and companies alike collect …
Zero round-trip time for the extended access control protocol
Abstract The Extended Access Control (EAC) protocol allows to create a shared
cryptographic key between a client and a server. While originally used in the context of …
cryptographic key between a client and a server. While originally used in the context of …
Attribute-based access control architectures with the eIDAS protocols
F Morgner, P Bastian, M Fischlin - … , Gaithersburg, MD, USA, December 5–6 …, 2016 - Springer
The extended access control protocol has been used for the German identity card since
November 2010, primarily to establish a cryptographic key between a card and a service …
November 2010, primarily to establish a cryptographic key between a card and a service …
Restricted identification without group keys
We present a variant of the protocol stack for anonymous authentication implemented in
German personal identity documents. We strengthen the system by eliminating group keys-a …
German personal identity documents. We strengthen the system by eliminating group keys-a …
Method for a pseudonymous key-agreement between a portable data carrier and a terminal
R Urian - US Patent 10,630,475, 2020 - Google Patents
A pseudonymous Diffie-Hellman protocol is provided by means of a combination of the CA
protocol with the RI protocol. According to the invention the determining of the pseudonym …
protocol with the RI protocol. According to the invention the determining of the pseudonym …