Anonymous security systems and applications requirements and solutions /
"This book outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users, solve various privacy issues and encourage more people to make full use of information and communication technologies"--Provided by publisher.
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2012.
|
Subjects: | |
Online Access: | Chapter PDFs via platform: |
Table of Contents:
- 1. Secure anonymous systems and requirements
- 2. Encryption and decryption
- 3. Schemes for digital signatures
- 4. Encryption schemes for anonymous systems
- 5. Approaches to developing secure anonymous systems
- 6. Integrity of anonymous data
- 7. Anonymous communication
- 8. Anonymous statistics calculation
- 9. Anonymous authentication systems
- 10. Electronic payment systems
- 11. Electronic procurement systems
- 12. Electronic governance systems.