Standard
Technical implementation and feasibility. / Mikkelsen, G.L.; Damgård, K.; Guldager, H. et al.
Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, 2015. p. 255-318.
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Chapter
Harvard
Mikkelsen, GL, Damgård, K, Guldager, H, Jensen, JL, Luna, JG, Nielsen, JD, Paillier, P, Pellegrino, G, Stausholm, MB
, Suri, N & Zhang, H 2015,
Technical implementation and feasibility. in
Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, pp. 255-318.
https://doi.org/10.1007/978-3-319-14439-9_9
APA
Mikkelsen, G. L., Damgård, K., Guldager, H., Jensen, J. L., Luna, J. G., Nielsen, J. D., Paillier, P., Pellegrino, G., Stausholm, M. B.
, Suri, N., & Zhang, H. (2015).
Technical implementation and feasibility. In
Attribute-Based Credentials for Trust: Identity in the Information Society (pp. 255-318). Springer International Publishing.
https://doi.org/10.1007/978-3-319-14439-9_9
Vancouver
Mikkelsen GL, Damgård K, Guldager H, Jensen JL, Luna JG, Nielsen JD et al.
Technical implementation and feasibility. In Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing. 2015. p. 255-318 doi: 10.1007/978-3-319-14439-9_9
Author
Mikkelsen, G.L. ; Damgård, K. ; Guldager, H. et al. /
Technical implementation and feasibility. Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing, 2015. pp. 255-318
Bibtex
@inbook{c5faa48f48c944588e4b710abeee482d,
title = "Technical implementation and feasibility",
abstract = "This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter. {\textcopyright} Springer International Publishing Switzerland 2015.",
keywords = "Smart cards, Application developers, Desktop environment, Perturbation Analysis, Proof of concept, Reference implementation, Smart card implementation, Technical implementation, Network architecture",
author = "G.L. Mikkelsen and K. Damg{\aa}rd and H. Guldager and J.L. Jensen and J.G. Luna and J.D. Nielsen and P. Paillier and G. Pellegrino and M.B. Stausholm and Neeraj Suri and H. Zhang",
year = "2015",
doi = "10.1007/978-3-319-14439-9_9",
language = "English",
isbn = "9783319144399 ",
pages = "255--318",
booktitle = "Attribute-Based Credentials for Trust",
publisher = "Springer International Publishing",
}
RIS
TY - CHAP
T1 - Technical implementation and feasibility
AU - Mikkelsen, G.L.
AU - Damgård, K.
AU - Guldager, H.
AU - Jensen, J.L.
AU - Luna, J.G.
AU - Nielsen, J.D.
AU - Paillier, P.
AU - Pellegrino, G.
AU - Stausholm, M.B.
AU - Suri, Neeraj
AU - Zhang, H.
PY - 2015
Y1 - 2015
N2 - This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter. © Springer International Publishing Switzerland 2015.
AB - This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter. © Springer International Publishing Switzerland 2015.
KW - Smart cards
KW - Application developers
KW - Desktop environment
KW - Perturbation Analysis
KW - Proof of concept
KW - Reference implementation
KW - Smart card implementation
KW - Technical implementation
KW - Network architecture
U2 - 10.1007/978-3-319-14439-9_9
DO - 10.1007/978-3-319-14439-9_9
M3 - Chapter
SN - 9783319144399
SN - 9783319144382
SP - 255
EP - 318
BT - Attribute-Based Credentials for Trust
PB - Springer International Publishing
ER -