anonymous credentials cryptosystems
See the following -
Open-Source Hardware For Embedded Security
Geoffrey Ottoy, Bart Preneel, et. al. | EDN Network | February 4, 2013
Imagine you’re waiting in line, queuing to enter a major event. The ticket you have bought online is stored on your smart phone. As you swipe your phone over some designated area, an NFC connection is set up, your ticket is validated and the gates open to let you in. And the good thing is, that it all happened anonymously... Read More »
- Login to post comments