Revocable credentials. Another approach is to build credentials that can be revoked in the event of bad behavior. This requires a procedure such that when a particular anonymous user does something bad (posts spam, runs a DOS attack against a website) you can revoke that specific user’s credential — blocking future usage of it, without otherwise learning who they are.
Author(s): Yukinari Ikeda, Akio Ishii
FT Digital Edition: our digitised print edition,推荐阅读PDF资料获取更多信息
Иран поразил нефтяной танкер под флагом США у берегов Кувейта14:49
。下载安装汽水音乐是该领域的重要参考
Захарова заявила о энергетическом коллапсе в Европе02:46
3014362810http://paper.people.com.cn/rmrb/pc/content/202603/05/content_30143628.htmlhttp://paper.people.com.cn/rmrb/pad/content/202603/05/content_30143628.html11921 凝聚人心 凝聚共识 凝聚智慧 凝聚力量,推荐阅读快连下载安装获取更多信息