Building secure and anonymous communication channel: formal model and its prototype implementation

SAC, pp. 1641-1648, 2014.

Cited by: 11|Views3
EI

Abstract:

Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers. One simple approach for realizing anonymously authenticated communication is their simple combination. ...More

Code:

Data:

Your rating :
0

 

Tags
Comments