Browsing by Subject "collusion"

Sort by: Order: Results:

  • Unknown author (IEEE, 2011)
    In general service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc. A good solution is to use pseudonyms as temporary identities. On the ...