Entry Stubblebine:1999:UST from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Stubblebine:1999:UST,
author = "Stuart G. Stubblebine and Paul F. Syverson and David
M. Goldschlag",
title = "Unlinkable serial transactions: protocols and
applications",
journal = j-TISSEC,
volume = "2",
number = "4",
pages = "354--389",
month = nov,
year = "1999",
CODEN = "ATISBQ",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Oct 26 11:39:38 MDT 2000",
bibsource = "http://www.acm.org/tissec/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
URL = "http://www.acm.org/pubs/articles/journals/tissec/1999-2-4/p354-stubblebine/p354-stubblebine.pdf;
http://www.acm.org/pubs/citations/journals/tissec/1999-2-4/p354-stubblebine/",
abstract = "We present a protocol for unlinkable serial
transactions suitable for a variety of network-based
subscription services. It is the first protocol to use
cryptographic blinding to enable subscription services.
The protocol prevents the service from tracking the
behavior of its customers, while protecting the service
vendor from abuse due to simultaneous or cloned use by
a single subscriber. Our basic protocol structure and
recovery protocol are robust against failure in
protocol termination. We evaluate the security of the
basic protocol and extend the basic protocol to include
auditing, which further deters subscription sharing. We
describe other applications of unlinkable serial
transactions for pay-per-use trans subscription,
third-party subscription management, multivendor
coupons, proof of group membership, and voting.",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Information and System Security",
generalterms = "Design; Security; Verification",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "anonymity; blinding; cryptographic protocols;
unlinkable serial transactions",
subject = "Computer Applications --- Administrative Data
Processing (J.1); Software --- Operating Systems ---
Security and Protection (D.4.6): {\bf Access controls};
Software --- Operating Systems --- Security and
Protection (D.4.6): {\bf Cryptographic controls};
Software --- Operating Systems --- Security and
Protection (D.4.6): {\bf Authentication}; Computing
Milieux --- Management of Computing and Information
Systems --- Security and Protection (K.6.5); Computing
Milieux --- Management of Computing and Information
Systems --- Security and Protection (K.6.5): {\bf
Authentication}; Computing Milieux --- Management of
Computing and Information Systems --- Security and
Protection (K.6.5): {\bf Unauthorized access (e.g.,
hacking, phreaking)}; Information Systems ---
Information Storage and Retrieval --- Systems and
Software (H.3.4): {\bf User profiles and alert
services}; Information Systems --- Database Management
--- Systems (H.2.4): {\bf Transaction processing};
Information Systems --- Information Storage and
Retrieval --- Digital Libraries (H.3.7): {\bf User
issues}",
}
Related entries
- abuse,
17(1)4
- administrative,
2(1)105,
6(2)201,
9(4)391,
10(2)7,
15(4)18
- against,
2(3)230,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(1)2,
16(2)8,
16(4)13,
17(1)4,
17(2)7,
17(2)8,
18(1)2,
18(2)7
- alert,
7(2)274,
10(1)4,
11(3)12,
11(4)20,
12(3)16
- anonymity,
1(1)66,
2(3)230,
2(4)390,
11(2)3,
11(2)6,
12(3)15,
13(2)13,
13(4)29,
13(4)39,
13(4)41,
14(1)4,
14(4)29,
15(1)5,
15(3)11,
15(3)12,
15(3)14,
17(1)4
- application,
1(1)66,
2(2)159,
2(2)177,
4(2)103,
7(1)1,
7(1)97,
8(3)287,
9(1)1,
9(1)94,
10(1)2,
10(2)6,
10(4)3,
11(1)2,
11(1)3,
11(3)14,
11(3)16,
11(4)22,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(4)21,
13(1)4,
13(1)10,
13(2)17,
13(3)22,
13(3)26,
13(4)38,
13(4)39,
14(1)2,
14(1)3,
14(1)6,
14(1)8,
14(1)9,
14(2)19,
14(3)27,
15(1)2,
15(1)4,
16(1)1,
16(1)2,
16(2)6,
16(3)9,
16(4)13,
16(4)17,
17(2)5,
17(4)13,
18(3)10,
18(4)12
- auditing,
2(2)159,
9(1)31,
10(1)4
- authentication,
1(1)3,
2(2)138,
2(2)159,
2(2)177,
2(3)230,
2(3)332,
2(4)390,
5(4)367,
5(4)458,
6(2)258,
10(3)10,
10(3)11,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(4)21,
13(2)17,
13(4)32,
14(1)5,
14(1)11,
14(4)29,
16(2)6,
16(2)8,
16(4)15,
17(2)6,
17(4)14,
18(1)1,
18(3)11,
18(4)14
- based, network-,
17(3)12
- basic,
9(4)461,
10(1)4,
10(2)8,
11(2)3,
11(3)12,
12(2)8,
13(3)27,
14(3)26,
14(4)31,
15(3)12,
17(4)13,
18(2)5
- behavior,
2(3)295,
10(4)6,
11(4)19,
12(1)5,
12(3)14,
12(3)19,
14(1)10,
14(4)32,
15(1)2,
15(2)10,
15(3)14,
16(3)12,
17(2)8,
18(2)5,
18(2)7,
18(3)9
- computer,
1(1)66,
2(1)34,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
2(3)332,
2(4)416,
10(2)5,
11(4)20,
12(2)7,
13(2)11,
15(1)1,
15(2)9,
16(2)5,
17(2)6
- computing,
1(1)3,
1(1)66,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(4)390,
10(4)3,
11(1)3,
11(2)2,
12(1)6,
12(2)8,
12(3)15,
13(3)25,
16(3)11,
18(3)11
- cryptographic,
2(3)230,
2(4)390,
2(4)416,
9(2)181,
10(2)6,
10(3)10,
10(4)3,
11(3)12,
12(2)9,
13(1)2,
14(1)10,
14(1)11,
14(1)14,
15(1)3,
15(2)9,
16(1)2,
16(2)6,
17(2)7,
17(3)10,
18(1)3
- customer,
11(1)4,
12(2)13
- D.4.6,
1(1)3,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)295
- database,
1(1)26,
1(1)93,
4(4)321,
8(1)119,
9(1)31,
10(1)2,
10(4)4,
11(2)5,
12(2)8,
13(4)31,
13(4)32,
14(3)25,
16(3)12,
17(3)11,
18(3)9
- describe,
1(1)66,
2(1)3,
2(1)34,
2(1)105,
2(2)159,
2(2)177,
2(3)230,
2(4)390,
7(2)319,
10(4)3,
11(4)21,
12(1)1,
12(2)11,
12(3)16,
12(4)21,
13(4)30,
13(4)34,
14(3)24,
14(3)27,
15(3)11,
15(3)13,
16(3)10,
16(3)12,
16(4)14,
17(2)5,
18(2)8
- digital,
7(1)1,
10(3)12,
11(4)21,
12(1)3,
12(3)15,
14(1)5,
17(3)12,
17(4)16,
18(1)1,
18(3)9
- due,
11(4)19,
13(3)25,
14(1)7,
14(4)31,
15(2)9,
18(1)1
- e.g.,
1(1)66,
2(2)177,
2(3)230,
2(4)390,
10(4)1,
11(4)22,
12(1)1,
12(2)10,
12(2)12,
14(1)2,
15(2)6,
16(2)7,
16(4)14,
17(1)1,
17(3)12,
17(4)15,
18(3)9
- enable,
2(2)177,
2(3)230,
9(4)461,
10(2)5,
11(1)3,
11(4)17,
11(4)23,
12(1)1,
12(1)6,
12(3)14,
13(3)25,
13(4)31,
14(1)3,
14(1)8,
14(4)32,
15(2)7,
16(1)2,
16(2)7,
17(2)5,
17(2)8,
17(3)10,
17(4)16,
18(1)2
- evaluate,
2(2)138,
10(4)3,
11(2)3,
11(3)12,
11(3)14,
13(3)26,
13(4)30,
13(4)35,
14(1)3,
15(3)13,
15(4)17,
16(1)2,
16(2)6,
17(1)1,
17(2)8,
17(4)14,
18(4)14
- extend,
2(4)390,
9(4)461,
10(1)2,
11(4)20,
12(1)5,
13(3)24,
14(1)8,
14(3)26,
15(1)4,
16(1)4,
16(2)5,
16(3)9,
16(3)10,
17(2)5,
17(2)7,
17(4)15
- failure,
10(4)6,
11(3)13,
13(4)34,
14(1)3
- first,
2(1)34,
2(1)105,
9(2)181,
10(4)6,
11(2)3,
11(2)4,
11(3)13,
11(4)18,
11(4)22,
12(1)3,
12(1)5,
12(3)18,
12(4)22,
13(4)31,
13(4)32,
14(1)13,
14(3)25,
14(4)30,
14(4)31,
15(4)17,
15(4)18,
16(3)10,
17(1)4,
17(2)6,
17(3)11,
18(1)4,
18(3)9,
18(4)12,
18(4)13
- further,
2(1)105,
2(3)230,
10(2)8,
10(3)12,
11(1)2,
11(3)15,
11(4)21,
12(2)11,
13(3)25,
13(3)27,
13(4)29,
13(4)30,
14(3)27,
15(2)7,
16(4)16,
16(4)17
- group,
1(1)66,
3(3)136,
4(3)289,
4(4)371,
6(4)547,
7(1)60,
7(3)457,
7(4)523,
10(3)10,
11(1)3,
11(4)18,
11(4)23,
12(1)4,
13(4)34,
14(1)4,
14(3)23,
14(4)28,
16(1)4,
17(1)4
- H.2.4,
1(1)26
- include,
2(2)138,
2(2)177,
11(1)3,
11(4)23,
12(3)19,
13(3)24,
13(4)34,
15(4)16,
17(4)16,
18(1)3,
18(1)4
- issue,
1(1)66,
2(1)65,
8(4)349,
10(1)1,
10(3)12,
11(1)2,
12(1)5,
12(2)7,
12(3)15,
12(4)22,
13(1)1,
13(2)11,
13(3)22,
13(3)26,
13(4)32,
15(1)1,
15(2)7,
16(2)7,
16(3)12,
17(1)1,
17(1)2
- K.6.5,
1(1)3,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(4)390
- library,
10(2)8,
12(2)10,
14(4)31,
15(1)2,
16(2)5,
16(3)9,
18(1)4
- management,
1(1)3,
2(1)3,
2(1)65,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(4)390,
3(2)107,
4(4)321,
4(4)453,
5(2)95,
6(3)327,
9(4)391,
10(4)2,
10(4)4,
11(4)21,
12(1)6,
12(3)18,
13(1)5,
13(4)36,
16(1)4
- membership,
10(4)2,
11(1)3,
11(2)3,
12(3)15,
13(4)40,
14(3)23
- Milieux,
1(1)3,
1(1)66,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(4)390
- network-based,
17(3)12
- operating,
2(2)138,
2(2)177,
2(3)295,
4(1)72,
5(1)36,
11(4)20,
12(3)14,
13(1)10,
13(4)30,
14(1)6,
14(1)8,
14(3)24,
15(4)16,
17(4)14,
18(2)5,
18(3)11
- other,
1(1)93,
9(4)461,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)1,
10(4)5,
11(2)2,
11(2)6,
11(3)15,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)10,
12(3)14,
12(3)17,
12(4)22,
13(3)24,
13(3)25,
13(4)40,
14(3)23,
14(3)27,
14(4)30,
15(1)5,
15(2)6,
15(3)11,
15(3)14,
15(4)15,
16(4)15,
17(2)8,
17(3)9,
18(1)1,
18(1)3,
18(2)6,
18(4)12
- party, third-,
11(1)2,
11(3)14
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- prevent,
13(1)10,
13(4)37,
14(1)11,
14(3)27,
15(1)2,
15(2)10,
16(1)1,
16(1)3
- processing,
10(1)3,
11(4)23,
13(3)22,
13(4)33,
14(4)31,
15(2)6
- profile,
2(3)295,
4(1)72,
16(2)8
- proof,
1(1)93,
2(3)230,
2(3)332,
9(2)181,
10(2)6,
11(3)13,
12(1)3,
12(2)8,
13(3)20,
13(3)25,
14(1)12,
15(1)4,
17(1)4,
17(4)15,
18(1)4,
18(2)8
- protecting,
1(1)66,
2(3)269,
10(4)3,
13(3)22,
15(2)9
- protection,
1(1)3,
1(1)26,
1(1)66,
1(1)93,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)295,
2(4)390,
10(1)3,
10(3)9,
11(4)20,
12(2)9,
12(2)11,
13(3)22,
14(3)24,
15(1)2,
15(2)8,
16(2)6
- recovery,
7(2)319,
9(4)421
- retrieval,
12(3)16
- robust,
11(4)19,
13(4)38,
14(1)5,
18(2)7,
18(3)11,
18(4)12
- service,
4(4)453,
6(4)472,
10(1)2,
10(2)8,
10(3)11,
10(4)4,
10(4)6,
11(1)2,
11(1)4,
11(3)15,
11(4)19,
12(2)12,
12(3)16,
13(4)38,
13(4)39,
13(4)41,
14(1)5,
14(3)23,
15(2)6,
15(3)12,
15(3)13,
16(2)5,
16(2)6,
16(3)11,
16(3)12,
16(4)14,
17(4)13,
17(4)15,
18(1)1,
18(1)2,
18(4)12,
18(4)13
- sharing,
8(3)259,
9(4)461,
10(4)4,
11(1)3,
11(1)4,
11(3)13,
13(4)34,
14(3)23,
17(4)13
- single,
2(2)177,
10(1)4,
10(3)11,
10(4)1,
10(4)2,
11(1)4,
11(2)5,
12(3)18,
13(1)10,
14(1)3,
15(1)4,
17(3)10,
17(4)16
- software,
1(1)3,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)295,
3(1)51,
11(1)2,
12(2)11,
12(2)12,
12(3)14,
12(3)19,
14(1)8,
14(3)24,
14(4)32,
15(2)8,
17(1)1,
17(3)11
- storage,
2(3)295,
9(1)1,
10(4)3,
11(1)4,
12(1)3,
12(3)15,
12(3)16,
12(3)18,
13(3)22,
13(4)30,
13(4)37,
14(1)12,
14(2)20,
15(2)6,
15(2)9,
16(3)12,
17(3)10,
17(4)15
- structure,
9(2)113,
9(4)421,
10(3)11,
12(1)4,
12(3)15,
13(4)32,
14(1)4,
15(4)17,
18(2)8
- Stubblebine, Stuart G.,
2(2)138
- subscription,
14(3)23
- suitable,
2(3)230,
10(4)5,
11(4)22,
12(1)3,
12(3)15,
15(2)9,
17(3)10
- termination,
2(3)269,
5(2)138
- third-party,
11(1)2,
11(3)14
- tracking,
12(2)11,
15(2)7,
15(4)17
- transaction,
1(1)26,
1(1)66,
4(4)321,
13(3)20,
17(3)10,
18(1)2
- unauthorized,
2(3)269,
11(2)2,
13(3)28,
15(2)7
- unlinkable,
17(3)10
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- variety,
10(3)11,
10(3)12,
14(1)10,
14(3)27,
15(4)15,
16(2)5,
18(3)10
- vendor,
18(1)1
- voting,
11(4)22,
13(2)16,
14(1)4,
14(2)18,
17(1)4,
18(1)3
- while,
2(3)230,
9(4)391,
9(4)421,
9(4)461,
10(2)5,
10(4)2,
11(1)4,
11(2)2,
11(2)6,
11(4)18,
11(4)19,
11(4)22,
12(2)9,
12(3)16,
13(1)5,
13(3)22,
13(3)25,
13(4)39,
13(4)41,
14(3)25,
14(3)26,
14(4)31,
15(3)12,
15(4)15,
15(4)17,
16(3)9,
16(3)12,
16(4)16,
17(1)4,
17(3)9,
17(4)15,
18(1)1,
18(2)7