Search
for Author
All Reviews
Chaum, David
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
Showing credentials without identification: transferring signatures between unconditionally unlinkable pseudonyms
Chaum D. (ed) Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990) 2641990. Type: Proceedings
Chaum establishes a procedure for engaging in transactions with organizations that protect the privacy of the individual and yet allow the necessary transfer of information. He makes two initial assumptions and then relaxes them later ...
...
Jan 1 1992
Demonstrating that a public predicate can be satisfied without revealing any information about how
Chaum D. (ed) Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987) 1991987. Type: Proceedings
An interactive proof authentication protocol is a conversation between a verifier and a prover in which the verifier’s goal is to determine whether the prover knows the result of a given computation, and the prover’...
...
Mar 1 1989
A secure and privacy-protecting protocol for transmitting personal information between organizations
Chaum D. (ed), Evertse J. Advances in cryptology--CRYPTO ’86 (, Santa Barbara, CA, Aug 11-15, 1987) 1671987. Type: Proceedings
We live in an era when private information about individuals is stored by organizations ranging from community-based preschool centers to multinational insurance companies. In this environment, the necessity for transfer of such privat...
...
Nov 1 1988
Security without identification: transaction systems to make big brother obsolete
Chaum D. (ed) Communications of the ACM 28(10): 1030-1044, 1985. Type: Article
This paper discusses the problem of how computerization is laying a foundation for a dossier society, whereas organizations are attempting to avoid abuse by devising more pervasive, efficient, and interlinked computerized record-keepin...
...
Aug 1 1986
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy