Common use of User Anonymity Clause in Contracts

User Anonymity. For schemes [6, 7, 12], the identity IDC of the client C is transferred by plaintext, so an attacker can easily obtain the identity of the client. Thus user anonymity cannot be protected.

Appears in 2 contracts

Sources: Remote User Authentication and Key Agreement Scheme, Authentication and Key Agreement Scheme