Figures index

From

Enhanced Anonymous Tag Based Credentials

Shinsuke Tamura, Shuji Taniguchi

Information Security and Computer Fraud. 2014, 2(1), 10-20 doi:10.12691/iscf-2-1-3
  • Figure 1. Anonymous tag
  • Figure 2. Issuing anonymous credentials
  • Figure 3. Verifying anonymous credentials
  • Figure 4. Identity and attribute parts
  • Figure 5. Real and dummy parts in an attribute value