Home > Research > Publications & Outputs > Technical implementation and feasibility

Links

Text available via DOI:

View graph of relations

Technical implementation and feasibility

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Published

Standard

Technical implementation and feasibility. / Mikkelsen, G.L.; Damgård, K.; Guldager, H. et al.
Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, 2015. p. 255-318.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Harvard

Mikkelsen, GL, Damgård, K, Guldager, H, Jensen, JL, Luna, JG, Nielsen, JD, Paillier, P, Pellegrino, G, Stausholm, MB, Suri, N & Zhang, H 2015, Technical implementation and feasibility. in Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, pp. 255-318. https://doi.org/10.1007/978-3-319-14439-9_9

APA

Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B., Suri, N., & Zhang, H. (2015). Technical implementation and feasibility. In Attribute-Based Credentials for Trust: Identity in the Information Society (pp. 255-318). Springer International Publishing. https://doi.org/10.1007/978-3-319-14439-9_9

Vancouver

Mikkelsen GL, Damgård K, Guldager H, Jensen JL, Luna JG, Nielsen JD et al. Technical implementation and feasibility. In Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing. 2015. p. 255-318 doi: 10.1007/978-3-319-14439-9_9

Author

Mikkelsen, G.L. ; Damgård, K. ; Guldager, H. et al. / Technical implementation and feasibility. Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, 2015. pp. 255-318

Bibtex

@inbook{c5faa48f48c944588e4b710abeee482d,
title = "Technical implementation and feasibility",
abstract = "This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter. {\textcopyright} Springer International Publishing Switzerland 2015.",
keywords = "Smart cards, Application developers, Desktop environment, Perturbation Analysis, Proof of concept, Reference implementation, Smart card implementation, Technical implementation, Network architecture",
author = "G.L. Mikkelsen and K. Damg{\aa}rd and H. Guldager and J.L. Jensen and J.G. Luna and J.D. Nielsen and P. Paillier and G. Pellegrino and M.B. Stausholm and Neeraj Suri and H. Zhang",
year = "2015",
doi = "10.1007/978-3-319-14439-9_9",
language = "English",
isbn = "9783319144399 ",
pages = "255--318",
booktitle = "Attribute-Based Credentials for Trust",
publisher = "Springer International Publishing",

}

RIS

TY - CHAP

T1 - Technical implementation and feasibility

AU - Mikkelsen, G.L.

AU - Damgård, K.

AU - Guldager, H.

AU - Jensen, J.L.

AU - Luna, J.G.

AU - Nielsen, J.D.

AU - Paillier, P.

AU - Pellegrino, G.

AU - Stausholm, M.B.

AU - Suri, Neeraj

AU - Zhang, H.

PY - 2015

Y1 - 2015

N2 - This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter. © Springer International Publishing Switzerland 2015.

AB - This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter. © Springer International Publishing Switzerland 2015.

KW - Smart cards

KW - Application developers

KW - Desktop environment

KW - Perturbation Analysis

KW - Proof of concept

KW - Reference implementation

KW - Smart card implementation

KW - Technical implementation

KW - Network architecture

U2 - 10.1007/978-3-319-14439-9_9

DO - 10.1007/978-3-319-14439-9_9

M3 - Chapter

SN - 9783319144399

SN - 9783319144382

SP - 255

EP - 318

BT - Attribute-Based Credentials for Trust

PB - Springer International Publishing

ER -