2006
DOI: 10.4304/jcp.1.8.36-42
|View full text |Cite
|
Sign up to set email alerts
|

A Method of An Anonymous Authentication For Flat-rate Service

Abstract: <p class="MsoNormal" style="text-align: left; margin: 0cm 0cm 0pt;" align="left"><span class="text"><span style="font-family: ";Arial";,";sans-serif";; font-size: 9pt;">As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy protection has risen. When the Web services are used, they need not identify who is the user in some cases. In this paper, we propose the authentica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The research on anonymous authentication has been carried out by a number of research groups worldwide. A group of researchers from Tokai University, Japan, have proposed an approach [13] to access services based on user's authority but without identifying the patient at the service provider. This approach is based on attribute certificate issued by the Attribute Authority.…”
Section: Related Work and Tech Nology Requirementsmentioning
confidence: 99%
“…The research on anonymous authentication has been carried out by a number of research groups worldwide. A group of researchers from Tokai University, Japan, have proposed an approach [13] to access services based on user's authority but without identifying the patient at the service provider. This approach is based on attribute certificate issued by the Attribute Authority.…”
Section: Related Work and Tech Nology Requirementsmentioning
confidence: 99%
“…A group of researchers from Tokai University, Japan have proposed an approach to access services based on user's authority but without identification at the service provider. This approach is based on Attribute certificate issued by the Attribute Authority [6]. Leszczyna has presented two un-traceability protocols for mobile agent environment as a solution for anonymous access of IT services and its applications to an e-Health counselling scenario.…”
Section: Related Work and Technology Requirementsmentioning
confidence: 99%