Building secure and anonymous communication channel: formal model and its prototype implementation
SAC, pp. 1641-1648, 2014.
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers. One simple approach for realizing anonymously authenticated communication is their simple combination. ...More
PPT (Upload PPT)