Abstract
The large-scale automated transaction systems of the near future can be designed to protect the privacy and maintain the security of both individuals and organizations.
- 1 Burnham, D. The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and Our Democratic Process. Foreword by Walter Cronkite. Random House, New York, 1983. (Not cited in text.) Google ScholarDigital Library
- 2 Chaum, D. The dining cryptographers problem: Unconditional sender and recipient untraceability. Available from the author.Google Scholar
- 3 Chaum, D. Privacy protected payments: Unconditional payer and/or payee untraceability. Available from the author.Google Scholar
- 4 Chaum, D. Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. Available from the author.Google Scholar
- 5 Diffie, W., and Hellman, M.E. New directions in cryptography. IEEE Trans. hf. Theory T-17.76 (Nov. 1976), 644-654.Google Scholar
- 6 Rivest. R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, i: (Feb. 1978),120-126. Google ScholarDigital Library
Index Terms
- Security without identification: transaction systems to make big brother obsolete
Recommendations
Assuring privacy when big brother is watching
DMKD '03: Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discoveryHomeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and potential abuses of the data. Privacy-preserving data mining techniques ...
RFID security without extensive cryptography
SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networksA Radio Frequency Identification Device (RFID) allows effective identification of a large number of tagged objects without physical or visual contact. RFID systems are a promising technology for supply chain management and inventory control. As ...
Comments