This paper defines a range of desirable properties for privacy preserving blacklist checking protocols, and surveys existing technical solutions to this problem ...
Abstract. Consulting a remote blacklist as part of verifying a token should not come at the cost of privacy. In particular, the blacklist provider.
This paper defines a range of desirable properties for privacy preserving blacklist checking protocols, and surveys existing technical solutions to this problem ...
This paper defines a range of desirable properties for privacy preserving blacklist checking protocols, and surveys existing technical solutions to this problem ...
Sign up for an account to create a profile with publication list, tag and review your related work, and share bibliographies with your co-authors. Privacy- ...
This paper defines a range of desirable properties for privacy preserving blacklist checking protocols, and surveys existing technical solutions to this problem ...
Bibliographic details on Privacy-Friendly Checking of Remote Token Blacklists.
People also ask
What is token blacklisting?
What is blacklisting in network security?
IFIP IDMAN 2013, Date: 2013/04/08 - 2013/04/09, Location: London, UK. Publication date: 2013-01-01. Volume: 396 Pages: 18 - 33. ISSN: 978-3-642-37282-7.
The privacy that Tor provides serves many important purposes, as elaborated on the Tor. Project website [44]: journalists use Tor to protect their sources; ...
Privacy-Friendly Checking of Remote Token Blacklists. Conference Paper. Apr ... This paper defines a range of desirable properties for privacy preserving ...