Pseudonymous mobile identity architecture based on government-supported PKI

1Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

An electronic ID scheme must be usable in a wide range of circumstances, especially in ordinary situations, such as proving your right to a concession ticket on a bus. One of the problems to be addressed is privacy. Indeed, when documents are read by electronic means, a lot of information is not only revealed, but can be copied, stored and processed without our consent. Another issue is ubiquity, reliability and acceptance of the involved technology. In this paper we attempt to address these issues by combining an officially recognised national mobile e-ID infrastructure with identification procedures based on controlled identity revelation. We report a prototype implementation of an identity tool on a mobile phone with a PKI-SIM card. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Hyppönen, K., Hassinen, M., & Trichina, E. (2008). Pseudonymous mobile identity architecture based on government-supported PKI. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4968 LNCS, pp. 107–118). https://doi.org/10.1007/978-3-540-68979-9_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free