|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5224 occurrences of 2354 keywords
|
|
|
Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
102 | Gregory Neven |
Privacy-enhanced access control in primelife. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
96 | Samir Saklikar, Subir Saha |
User privacy-preserving identity data dependencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 45-54, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
liberty alliance, privacy, policy, SAML, digital identity, identity federation |
91 | Ivonne Thomas, Christoph Meinel |
Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2009 IEEE International Conference on Services Computing (SCC 2009), 21-25 September 2009, Bangalore, India, pp. 243-250, 2009, IEEE Computer Society, 978-0-7695-3811-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
91 | Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai |
DECIDE: a scheme for decentralized identity escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 37-45, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fair blind signature, online discussion community, school networking, whistleblowing, trust, anonymity, identity, pseudonymity, identity escrow |
86 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Establishing and protecting digital identity in federation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 11-19, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
identity management, federation, single sign-on, identity theft, zero knowledge proof |
85 | Samir Saklikar, Subir Saha |
Identity federation for voip-based services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 62-71, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SIP, voIP, identity, assertion, federation, SAML |
85 | JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon |
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 290-303, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow |
80 | Hidehito Gomi |
User-centric identity governance across domain boundaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 35-44, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
identity governance, privacy, policy enforcement |
78 | Marcin Dabrowski, Piotr Pacyna |
Cross-identifier domain discovery service for unrelated user identities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 81-88, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identifier domain, identity discovery, identity, discovery, federation |
76 | Paul Madsen, Yuzo Koga, Kenji Takahashi |
Federated identity management for protecting users from ID theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 77-83, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
phishing, identity theft, federated identity |
76 | Rakesh Radhakrishnan |
"Identity & context for a changing world". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 1-2, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
context, policy, identity |
76 | Makiko Aoyagi, Tsuyoshi Abe, Kenji Takahashi |
Symmetric identity federation for fixed-mobile convergence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 33-40, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SAML v2.0, fixed-mobile convergence, authentication, identity federation |
75 | Ivonne Thomas, Christoph Meinel |
An identity provider to manage reliable digital identities for SOA and the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010, pp. 26-36, 2010, ACM, 978-1-60558-895-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
SOA security, attribute management, identity provider, identity management |
74 | Yolanta Beres, Adrian Baldwin, Marco Casassa Mont, Simon Shiu |
On identity assurance in the presence of federated identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 27-35, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
models, control, risk, identity, audit, assurance |
70 | Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle |
Preventing identity theft with electronic identity cards and the trusted platform module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009, pp. 44-51, 2009, ACM, 978-1-60558-472-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication with TPM, electronic ID, identity system |
68 | David Bauer, Douglas M. Blough, David Cash |
Minimal information disclosure with efficiently verifiable credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 15-24, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree |
66 | Deborah J. Bodeau |
Safeguarding digital identity: the SPICI (Sharing Policy, Identity, and Control Information) approach to negotiating identity federation and sharing agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 52-60, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information sharing, identity management, credentials, identity federation |
66 | Akiko Orita, Hisakazu Hada |
Is that really you?: an approach to assure identity without revealing real-name online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 17-20, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, identity, twitter, identity theft, linkability, impersonation |
66 | Gail-Joon Ahn, John Lam |
Managing privacy preferences for federated identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 28-36, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, identity management, policy languages |
66 | Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, Satoru Fujita |
A delegation framework for federated identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 94-103, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privilege, access control, role, delegation, identity federation |
63 | Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Cinzia Squicciarini |
Minimal credential disclosure in trust negotiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 89-96, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identity attributes, micro-claims, minimal disclosure |
63 | Marcin Dabrowski, Piotr Pacyna |
Distributed identity discovery service for non-federated systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia, 24 - 26 November 2008, Linz, Austria, pp. 409-413, 2008, ACM, 978-1-60558-269-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identifier domains, identity discovery, identity, discovery, federation |
63 | Xueyong Zhu, J. William Atwood |
A Web Database Security Model Using the Host Identity Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), September 6-8, 2007, Banff, Alberta, Canada, pp. 278-284, 2007, IEEE Computer Society, 0-7695-2947-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Host Identity, User Identity, Security, Model, Web Database, HIP |
61 | Sébastien Canard, Eric Malville, Jacques Traoré |
Identity federation and privacy: one step beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 25-32, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, cryptography, identity management, user centric, identity federation |
61 | Thibault Candebat, Cameron Ross Dunne, David T. Gray |
Pseudonym management using mediated identity-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 1-10, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SEM architecture, location-based services, identity-based encryption, pseudonymity |
61 | Drummond Reed, Les Chasen, William Tan |
OpenID identity discovery with XRI and XRDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 19-25, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Higgins project, XRDS, XRI, Yadis, extensible resource descriptor sequence, extensible resource identifier, i-card, identity discovery, information card, user-centric identity, resolution, identifier, SAML, OpenID |
58 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Privacy preserving multi-factor authentication with biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 63-72, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
identity theft prevention, privacy, authentication, biometrics |
57 | Kei Karasawa |
Personalized search using identity-based hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 71-80, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identity-based hashing, anonymity, personalized search, private information retrieval, digital identity |
57 | Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi |
Implementing identity provider on mobile phone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 46-52, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
identity provider, authentication, mobile phone, federated identity |
56 | Daisuke Mashima, Mustaque Ahamad |
Using identity credential usage logs to detect anomalous service accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 73-80, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
identity theft and misuse detection, online access log monitoring, risk scoring |
56 | David Recordon, Drummond Reed |
OpenID 2.0: a platform for user-centric identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 11-16, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, authorization, open source, identity, open standard, user-centric |
56 | Yoshisato Takeda, Seiichi Kondo, Yasuhide Kitayama, Masashi Torato, Tsuyoshi Motegi |
Avoidance of performance bottlenecks caused by HTTP redirect in identity management protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 25-32, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
protocol, identity management |
54 | Craig W. Thompson, Dale R. Thompson |
Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 11(3), pp. 82-85, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Identity Solutions Symposium, RFID, smart cards, Identity management, identity theft, ID |
52 | Lin Liu 0001, Eric S. K. Yu |
Modeling Identity Management Architecture Within a Social Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Frontiers of WWW Research and Development - APWeb 2006, 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings, pp. 917-922, 2006, Springer, 3-540-31142-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
architecture and component analysis, Identity Management, Social Modeling |
52 | Xuhua Ding, Gene Tsudik |
Simple Identity-Based Cryptography with Mediated RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 193-210, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
mediated RSA, revocation, Identity-based encryption |
52 | Massimiliano Carrara, Pierdaniele Giaretta |
Identity criteria and sortal concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOIS ![In: 2nd International Conference on Formal Ontology in Information Systems, FOIS 2001, Ogunquit, Maine, USA, October 17-19, 2001, Proceedings., pp. 234-243, 2001, ACM, 1-58113-377-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
conceptualisation, identity criteria, sortal concepts, ontologies, knowledge bases |
52 | Gail-Joon Ahn, Moonam Ko, Mohamed Shehab |
Portable User-Centric Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 573-587, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Makoto Hatakeyama |
Federation proxy for cross domain identity federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 53-62, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
attribute exchange, privacy, identity federation |
51 | Sebastian Clauß, Dogan Kesdogan, Tobias Kölsch |
Privacy enhancing identity management: protection against re-identification and profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 84-93, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, identity management |
51 | Saman Zarandioon, Danfeng Yao, Vinod Ganapathy |
Privacy-aware identity management for client-side mashup applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 21-30, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
omos, security, communication, web, mashup, ajax |
50 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino, Xiangwei Kong, Weike Zhang |
Biometrics-based identifiers for digital identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010, pp. 84-96, 2010, ACM, 978-1-60558-895-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
multi-factor authentication, security, privacy, cryptography, biometrics, identity |
50 | Naveed Ahmed 0005, Christian Damsgaard Jensen |
A Mechanism for Identity Delegation at Authentication Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 148-162, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Identity Delegation, Usability of Security, Nomadic User, Practical Security |
50 | David Galindo |
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 318-326, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
tag-based encryption, identity-based encryption, Foundations |
50 | Mohamed Nabeel, Ning Shang, John Zage, Elisa Bertino |
Mask: a system for privacy-preserving policy-based access to published content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 1239-1242, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
broadcast systems, privacy, access control, identity, group key management |
48 | Takao Kojima, Yukio Itakura |
Proposal of privacy policy matching engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 9-14, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identity-related data, vendor relationship management, search engine, privacy policy |
48 | Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
User centricity: a taxonomy and open issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 1-10, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, taxonomy, delegation, user centric, user control, identity management systems |
48 | Clare Sullivan |
Digital Identity - The Legal Person?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 195-211, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
legal person, national identity scheme, Digital identity |
48 | Marion Schulze, Mahmood Hussain Shah |
The Step Method - Battling Identity Theft Using E-Retailers' Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings, pp. 173-183, 2009, Springer, 978-3-642-04279-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Identity Fraud, Customers’ Behavior, E-retailer, Security, Privacy, Websites, Identity Theft |
48 | Rajarajan Sampath, Deepak Goel |
RATING: Rigorous Assessment of Trust in Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 14-23, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Trust Responsivness, Trust, Trust Management, Identity, Identity Management, Trust Establishment |
47 | Amir Shpilka, Ilya Volkovich |
Read-once polynomial identity testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008, pp. 507-516, 2008, ACM, 978-1-60558-047-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bounded depth circuits, identity testing, read-once formulas, reconstruction, arithmetic circuits |
47 | David W. Chadwick |
Federated Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 96-120, 2008, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Identity Management, Federations, Shibboleth, CardSpace |
47 | Eve Atallah, Serge Chaumette |
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 1-13, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
auto-administration, smart cards, identity management, MANets |
47 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 1-14, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mutative Identity, ID-based Signature |
47 | Adina Astilean, Camelia Avram, Tiberiu Letia, Florian Mihele |
Fingerprint Based Temporary Identity Supporting Emergency Actions in Collective Accidents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eTELEMED ![In: International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2009, February 1-7, 2009, Cancun, Mexico, pp. 93-98, 2009, IEEE Computer Society, 978-0-7695-3532-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | James L. Wayman |
Biometrics in Identity Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(2), pp. 30-37, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Fangguo Zhang, Willy Susilo, Yi Mu 0001 |
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 45-56, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Lin Liu 0001, Eric S. K. Yu |
Intentional Modeling to Support Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - ER 2004, 23rd International Conference on Conceptual Modeling, Shanghai, China, November 2004, Proceedings, pp. 555-566, 2004, Springer, 3-540-23723-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Toshiyuki Isshiki, Kengo Mori, Kazue Sako, Isamu Teranishi, Shoko Yonezawa |
Using group signatures for identity management and its implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 73-78, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
implementation, identity management, group signature, user revocation |
46 | Jan Camenisch, Abhi Shelat, Dieter Sommer, Simone Fischer-Hübner, Marit Hansen, Henry Krasemann, Gérard Lacoste, Ronald Leenes, Jimmy C. Tseng |
Privacy and identity management for everyone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 20-27, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
anonymous transactions, privacy, protocols, identity management, credentials |
46 | Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino, Stefano Braghin |
Identity-based long running negotiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 97-106, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trust negotiations, distributed authorization |
45 | Long Nguyen Hoang, Pekka Laitinen, N. Asokan |
Secure roaming with identity metasystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 36-47, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identity metasystem, mobility, roaming |
45 | Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon |
Complex federation architectures: stakes, tricks & issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSTST ![In: CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, Cergy-Pontoise, France, October 28-31, 2008, pp. 152-157, 2008, ACM, 978-1-60558-046-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed identity management systems, privacy, architecture, delegation, identity federation |
45 | Nigel P. Smart, Bogdan Warinschi |
Identity Based Group Signatures from Hierarchical Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings, pp. 150-170, 2009, Springer, 978-3-642-03297-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Andrzej Drygajlo |
Biometrics for Identity Documents and Smart Cards: European Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOID ![In: Biometrics and Identity Management, First European Workshop, BIOID 2008, Roskilde, Denmark, May 7-9, 2008. Revised Selected Papers, pp. 236-244, 2008, Springer, 978-3-540-89990-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 216-231, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
43 | Marc Barisch |
Modelling the impact of virtual identities on communication infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 45-52, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
aaa performance, authentication load, identity management, virtual identities |
43 | Yacine Belala, James Wong |
Towards identity-based services in IMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 979-983, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
identity-aware services, IP multimedia subsystem, federated identity management, reverse auctions, multi-attributes utility theory |
43 | Sergio Sánchez García, Ana Gómez Oliva |
Solving Identity Management and Interoperability Problems at Pan-European Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems: OTM 2009 Workshops, Confederated International Workshops and Posters, ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009, Vilamoura, Portugal, November 1-6, 2009. Proceedings, pp. 805-809, 2009, Springer, 978-3-642-05289-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
eIdentity, identity delegation, interoperability, identity federation |
43 | Philip Seltsikas, Matthew Dunlap, Georgia K. Marsh, Brent Crossland, Dan Combs |
Digital government's critical enabler: identity management? ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2008, Montreal, Canada, May 18-21, 2008, pp. 437-438, 2008, Digital Government Research Center, 978-1-60558-099-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
government agencies, government investments, security, privacy, authentication, government, infrastructure, identity, identity management, information and communication technologies |
43 | William H. Winsborough, Anna Cinzia Squicciarini, Elisa Bertino |
Information carrying identity proof trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 76-79, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
identity proof, identity provenance, validation |
43 | Jeff Jonas |
Identity resolution: 23 years of practical experience and observations at scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Chicago, Illinois, USA, June 27-29, 2006, pp. 718, 2006, ACM, 1-59593-256-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anonymous identity resolution, identity resolution, semantic reconciliation |
43 | Elizabeth A. Evans, Carolyn M. Kotlas, Donna W. Bailey, Abe Crystal, Terri Buckner |
It's eleven o'clock: do you know where your identity is? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 361-363, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
identity abuse, identity theft |
43 | Pedro Martins 0004, Jorge P. Batista |
Simultaneous Identity and Expression Recognition Using Face Geometry on Low Dimensional Manifolds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IbPRIA ![In: Pattern Recognition and Image Analysis, 4th Iberian Conference, IbPRIA 2009, Póvoa de Varzim, Portugal, June 10-12, 2009, Proceedings, pp. 505-512, 2009, Springer, 978-3-642-02171-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Laplacian EigenMaps, Identity and Expression Manifolds, Support Vector Machines, Active Appearance Models |
43 | Ben Jennings, Anthony Finkelstein |
Digital Identity and Reputation in the Context of a Bounded Social Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management Workshops ![In: Business Process Management Workshops, BPM 2008 International Workshops, Milano, Italy, September 1-4, 2008. Revised Papers, pp. 687-697, 2008, Springer, 978-3-642-00327-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RMR, SOA, Trust, Workflow, Reputation, Recommendation, BPEL, Flexible, Identity |
43 | Vikraman Arvind, Partha Mukhopadhyay, Srikanth Srinivasan 0001 |
New Results on Noncommutative and Commutative Polynomial Identity Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 23rd Annual IEEE Conference on Computational Complexity, CCC 2008, 23-26 June 2008, College Park, Maryland, USA, pp. 268-279, 2008, IEEE Computer Society, 978-0-7695-3169-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
randomized, polynomial time, deterministic, polynomial identity testing |
43 | Christine Satchell, Graeme G. Shanks, Steve Howard, John Murphy 0002 |
Beyond security: implications for the future of federated digital identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 2006 Australasian Computer-Human Interaction Conference, OZCHI 2006, Sydney, Australia, November 20-24, 2006, pp. 313-316, 2006, ACM, 1-59593-545-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, federation, digital identity |
43 | Benoît Libert, Jean-Jacques Quisquater |
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 57-70, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
PKIs, pairings, identity based cryptography |
43 | Jan Camenisch, Anna Lysyanskaya |
An Identity Escrow Scheme with Appointed Verifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 388-407, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
formal model for group signatures, group signatures, privacy protection, Identity escrow |
42 | Yanli Ren, Dawu Gu |
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 104-115, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Uwe Glässer, Mona Vajihollahi |
Identity management architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 137-144, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Sebastian Rieger, Bernhard Neumair |
Towards usable and reasonable Identity Management in heterogeneous IT infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2007. 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007, pp. 560-574, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Hristo Koshutanski, Mihaela Ion, Luigi Telesca |
Distributed Identity Management Model for Digital Ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 132-138, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Zhikui Chen |
A Scenario for Identity Management in Daidalos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada, pp. 176-183, 2007, IEEE Computer Society, 0-7695-2835-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Ty Mey Eap, Marek Hatala, Dragan Gasevic |
Enabling User Control with Personal Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2007 IEEE International Conference on Services Computing (SCC 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 60-67, 2007, IEEE Computer Society, 0-7695-2925-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Norihiro Ogata |
A Dynamic Semantics of Intentional Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSAI ![In: New Frontiers in Artificial Intelligence, JSAI 2006 Conference and Workshops, Tokyo, Japan, June 5-9 2006, Revised Selected Papers, pp. 103-117, 2006, Springer, 3-540-69901-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Michael T. Goodrich, Roberto Tamassia, Danfeng Yao |
Notarized Federated Identity Management for Web Services. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 133-147, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Mansour Alsaleh, Carlisle Adams |
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 59-77, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Identity Based Key Insulated Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 226-234, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Elisa Bertino |
Digital identity management and protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 1, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Amit Sahai, Brent Waters |
Fuzzy Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 457-473, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Douglas Thain |
Identity boxing: secure user-level containment for the grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing, HPDC-14, Research Triangle Park, North Carolina, USA, 24-27 July 2005, pp. 299-300, 2005, IEEE Computer Society, 0-7803-9037-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Deborah G. Johnson, Keith W. Miller 0001 |
Anonymity, pseudonymity, or inescapable identity on the net (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 37-38, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Internet |
42 | Joe Kilian, Erez Petrank |
Identity Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 169-185, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
41 | Arshad Noor |
Identity protection factor (IPF). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 8-18, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
asymmetric key, identification & authentication, identity protection factor (IPF), shared-secret, authentication, access control, identity management, symmetric key |
41 | Yunsang Oh, Takashi Obi, Joong Sun Lee, Hiroyuki Suzuki, Nagaaki Ohyama |
Empirical analysis of internet identity misuse: case study of south Korean real name system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 27-34, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
40 | Laurianne McLaughlin, Barton C. Massey |
In the News. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 23(1), pp. 108-113, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
identity metasystem, InfoCard, Security Assertion Markup Language, Sxip Identity, Liberty Alliance, GOSCON, security, Internet, IT, open source, government, SAML, Kerberos, X.509 |
40 | Golnaz Elahi, Zeev Lieber, Eric S. K. Yu |
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 661-666, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | David Galindo, Paz Morillo, Carla Ràfols |
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 81-91, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption |
39 | Marco Hünseler, Eva Pöll |
Promises and Problems in the Adoption of Self-Sovereign Identity Management from a Consumer Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30 - September 2, 2022, Proceedings, pp. 85-100, 2022, Springer, 978-3-031-31970-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Jorge Bernal Bernabé, Jesús García Rodríguez, Stephan Krenn, Vasia Liagkou, Antonio F. Skarmeta, Rafael Torres |
Privacy-Preserving Identity Management and Applications to Academic Degree Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pp. 33-46, 2021, Springer, 978-3-030-99099-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 14619 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|