Hedbom et al., 2009 - Google Patents
Adding secure transparency logging to the prime coreHedbom et al., 2009
View PDF- Document ID
- 16145681759717313873
- Author
- Hedbom H
- Pulls T
- Hjärtquist P
- Lavén A
- Publication year
- Publication venue
- IFIP PrimeLife International Summer School on Privacy and Identity Management for Life
External Links
Snippet
This paper presents a secure privacy preserving log. These types of logs are useful (if not necessary) when constructing transparency services for privacy enhancement. The solution builds on and extends previous work within the area and tries to address the shortcomings …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Davidson et al. | Privacy pass: Bypassing internet challenges anonymously | |
US8185942B2 (en) | Client-server opaque token passing apparatus and method | |
US7685430B1 (en) | Initial password security accentuated by triple encryption and hashed cache table management on the hosted site's server | |
US7650505B1 (en) | Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies | |
US7730523B1 (en) | Role-based access using combinatorial inheritance and randomized conjugates in an internet hosted environment | |
JP2006511104A (en) | Encryption method and encryption apparatus for secure authentication | |
JP2003536320A (en) | System, method and software for remote password authentication using multiple servers | |
Brandão et al. | Toward Mending Two Nation-Scale Brokered Identification Systems. | |
US11700125B2 (en) | zkMFA: zero-knowledge based multi-factor authentication system | |
Guirat et al. | Formal verification of the W3C web authentication protocol | |
Osman et al. | Proposed security model for web based applications and services | |
Paquin | U-prove technology overview v1. 1 | |
US20090222888A1 (en) | Communicating a password securely | |
Murdoch | Hardened stateless session cookies | |
Hedbom et al. | Adding secure transparency logging to the prime core | |
Chaudhary et al. | Interoperable identity management protocol for multi-cloud platform | |
Jakubeit et al. | SSI-AWARE: Self-sovereign identity authenticated backup with auditing by remote entities | |
Yagoub et al. | A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment | |
Alecu et al. | OpenID, a single sign-on solution for e-learning applications | |
Buldas et al. | Electronic signature system with small number of private keys | |
Chen et al. | SSL/TLS session-aware user authentication using a gaa bootstrapped key | |
Jiang et al. | Device-Enhanced Password-Based Threshold Single-Sign-On Authentication | |
ALnwihel et al. | A Novel Cloud Authentication Framework | |
Zhao et al. | A unified security analysis of two-phase key exchange protocols in TPM 2.0 | |
Alahmad et al. | Improved the authentication technology on Single Sign-On Protocol “OpenIDConnect” to avoid session hijacking attacks |