|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5224 occurrences of 2354 keywords
|
|
|
Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li |
Identity-Based Key-Insulated Signature with Secure Key-Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 13-26, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure |
28 | Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 67-72, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XML signature standard, verifiable random function, security, privacy, WS-security, federated identity management |
28 | Craig Gentry |
Practical Identity-Based Encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 445-464, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Identity Based Encryption |
28 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 409-423, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure |
28 | Sanjit Chatterjee, Palash Sarkar 0001 |
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 394-408, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Multi-receiver encryption, bilinear pairing, identity based encryption |
28 | Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto |
Universally Composable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 337-353, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IND-ID-CCA2, universal composition, identity-based encryption |
28 | Fan Zhang, Dengguo Feng |
Identity-based PKI Scheme for Machine Readable Travel Document. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 461-465, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MRTD, PKD, DSI, DSPK, PKI, Identity-based signature |
28 | Marco Casassa Mont, Robert Thyne |
Privacy policy enforcement in enterprises with identity management solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 25, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, identity management, policy enforcement |
28 | Maaria Nuutinen |
Expert Identity construct in analysing prerequisites for expertise development: a case study of nuclear power plant operators' on-the-job training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 7(4), pp. 288-305, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Expert Identity, Emotions, Process control, Nuclear power plant, Work analysis, On-the-job training |
28 | Martin Gaedke, Johannes Meinecke, Martin Nussbaumer |
A modeling approach to federated identity and access management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW (Special interest tracks and posters) ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005 - Special interest tracks and posters, pp. 1156-1157, 2005, ACM, 1-59593-051-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
identity and access management, security, reuse, federation |
28 | Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 |
An Identity-Based Model for Grid Security Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSADS ![In: Advanced Distributed Systems: 5th International School and Symposium, ISSADS 2005, Guadalajara, Mexico, January 24-28, 2005, Revised Selected Papers, pp. 258-266, 2005, Springer, 3-540-28063-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Identity Cryptography, Grid Security Infrastructure, Secure Group Communication |
28 | Dan Boneh, Jonathan Katz |
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 87-103, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Public-key encryption, Identity-based encryption, Chosen-ciphertext security |
28 | Zeev Dvir, Amir Shpilka |
Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 592-601, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
depth 3 circuits, locally decodable codes, polynomial identity testing |
28 | Sherman S. M. Chow, Willy Susilo |
Generic Construction of (Identity-Based) Perfect Concurrent Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 194-206, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Perfect Ambiguity, Bilinear Pairing, Fair-Exchange, Ring Signatures, Identity-based Signatures, Concurrent Signatures |
28 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Threshold Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 218-232, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature |
28 | Swee-Huay Heng, Kaoru Kurosawa |
k-Resilient Identity-Based Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 67-80, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption |
28 | Valentine Kabanets, Russell Impagliazzo |
Derandomizing polynomial identity tests means proving circuit lower bounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, USA, pp. 355-364, 2003, ACM, 1-58113-674-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
BPP, NEXP, circuit lower bounds, derandomization, polynomial identity testing |
28 | Lauge Baungaard Rasmussen |
Identity Building in Organisations: Proactive Capability Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 16(4), pp. 377-394, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Identity building, Proactive capabilities, Routine reflection, Scenario method, Creativity, Organisation, Conflict management |
28 | Rich Ling |
"We Release Them Little by Little": Maturation and Gender Identity as Seen in the Use of Mobile Telephony. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 5(2), pp. 123-136, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Youth, Identity, Mobile telephony |
28 | Shahrokh Saeednia, Reihaneh Safavi-Naini |
Efficient Identity-Based Conference Key Distribution Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 320-331, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Security classes, Identity-based, Conference key |
27 | Matthew Rowe 0001 |
Applying Semantic Social Graphs to Disambiguate Identity References. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESWC ![In: The Semantic Web: Research and Applications, 6th European Semantic Web Conference, ESWC 2009, Heraklion, Crete, Greece, May 31-June 4, 2009, Proceedings, pp. 461-475, 2009, Springer, 978-3-642-02120-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Feng Zhu 0010, Wei Zhu |
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Seventh Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, USA, pp. 1-8, 2009, IEEE Computer Society, 978-1-4244-3304-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Chuiwei Lu |
Detection and Defense of Identity Attacks in P2P Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Advances in Computation and Intelligence, 4th International Symposium, ISICA 2009, Huangshi, China, Ocotober 23-25, 2009, Proceedings, pp. 500-507, 2009, Springer, 978-3-642-04842-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Identify attack, Intrusion detection, Network security, P2P |
27 | Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh |
Identity-based secure protocol scheme for wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 555-560, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ID-based authentication, clustering, wireless sensor network, authentication, proxy |
27 | Ming-Hour Yang, Jain-Shing Wu, Shih-Jen Chen |
Protect mobile RFID location privacy using dynamic identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, ICCI 2008, Stanford University, California, USA, August 14-16, 2008, pp. 366-374, 2008, IEEE Computer Society, 978-1-4244-2538-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Milena Yankova, Horacio Saggion, Hamish Cunningham |
Adopting ontologies for multisource identity resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OBI ![In: Proceedings of the First International Workshop on Ontology-supported Business Intelligence, OBI 2008, Karlsruhe, Germany, October 27, 2008, pp. 6, 2008, ACM, 978-1-60558-219-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Gang Yao, Hongji Wang, Qingshan Jiang |
An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 538-543, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Shanqing Guo, Chunhua Zhang |
Identity-based Broadcast Encryption Scheme with Untrusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1613-1618, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Zhi Guan, Huiping Sun, Zhong Chen 0001, Xianghao Nan |
Efficient Identity-Based Key Issue with TPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2354-2359, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Chenxi Zhang, Rongxing Lu, Xiaodong Lin 0001, Pin-Han Ho, Xuemin Shen |
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 246-250, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Alcides Castro-e-Silva, Gerald Weber, Romuel F. Machado, Elizabeth F. Wanner, Renata Guerra-Sá |
Identity Transposon Networks in D. melanogaster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BSB ![In: Advances in Bioinformatics and Computational Biology, Third Brazilian Symposium on Bioinformatics, BSB 2008, Santo André, Brazil, August 28-30, 2008. Proceedings, pp. 161-164, 2008, Springer, 978-3-540-85556-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Stephen Wilson |
Public key superstructure "it's PKI Jim, but not as we know it!". ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 72-88, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, PKI, public key infrastructure, digital certificates |
27 | Mandana Vaziri, Frank Tip, Stephen Fink, Julian Dolby |
Declarative Object Identity Using Relation Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP 2007 - Object-Oriented Programming, 21st European Conference, Berlin, Germany, July 30 - August 3, 2007, Proceedings, pp. 54-78, 2007, Springer, 978-3-540-73588-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Chaorong Peng, Chang Wen Chen |
A New Network Layer for Mobile Ad Hoc Wireless Networks Based on Assignment Router Identity Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 786-791, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hoon Wei Lim, Kenneth G. Paterson |
Multi-key Hierarchical Identity-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 384-402, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Michel Abdalla, Eike Kiltz, Gregory Neven |
Generalized Key Delegation for Hierarchical Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 139-154, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Rajeev Gupta, Shourya Roy, Manish Bhide |
Identity Delegation in Policy Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 229-240, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Rodrigo Lopes, Dongwan Shin |
Controlled sharing of identity attributes for better privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 2-7, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Vipul Goyal |
Reducing Trust in the PKG in Identity Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 430-447, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sabine Delaître |
Risk Management approach on identity theft in biometric systems context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 982, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Liang Li, Jie Tian 0001, Xin Yang 0001 |
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 175-176, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Clifton Phua, Vincent C. S. Lee, Ross W. Gayler, Kate A. Smith |
Temporal Representation in Spike Detection of Sparse Personal Identity Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 115-126, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Christian Veigner, Chunming Rong |
On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 521-530, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | G. Alan Wang, Hsinchun Chen, Homa Atabakhsh |
A Multi-layer Naïve Bayes Model for Approximate Identity Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 479-484, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | R. J. Hulsebosch, Mortaza S. Bargh, P. H. Fennema, J. F. Zandbelt, Martin Snijders, E. H. Eertink |
Using Identity Management and Secure DNS for Effective and Trusted User Controlled Light-Path Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: 2006 International Conference on Networking and Services (ICNS 2006), 16-21 July 2006, Silicon Valley, California, USA, pp. 79, 2006, IEEE Computer Society, 0-7695-2622-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jin Wang, Jia Yu 0005, Daxing Li, Xi Bai 0002, Zhongtian Jia |
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 847-857, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Hoon Wei Lim, Kenneth G. Paterson |
Identity-Based Cryptography for Grid Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: First International Conference on e-Science and Grid Technologies (e-Science 2005), 5-8 December 2005, Melbourne, Australia, pp. 395-404, 2005, IEEE Computer Society, 0-7695-2448-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Alan N. Martin, Gregory M. P. O'Hare, Brian R. Duffy, Bianca Schön, John F. Bradley |
Maintaining the Identity of Dynamically Embodied Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVA ![In: Intelligent Virtual Agents, 5th International Working Conference, IVA 2005, Kos, Greece, September 12-14, 2005, Proceedings, pp. 454-465, 2005, Springer, 3-540-28738-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Rita Sharma, David Poole 0001 |
Probability and Equality: A Probabilistic Model of Identity Uncertainty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Canadian AI ![In: Advances in Artificial Intelligence, 18th Conference of the Canadian Society for Computational Studies of Intelligence, Canadian AI 2005, Victoria, Canada, May 9-11, 2005, Proceedings, pp. 227-231, 2005, Springer, 3-540-25864-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Changgen Peng, Xiang Li |
An Identity-Based Threshold Signcryption Scheme with Semantic Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 173-179, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Gail-Joon Ahn, Dongwan Shin, Seng-Phil Hong |
Information Assurance in Federated Identity Management: Experimentations and Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: Web Information Systems - WISE 2004, 5th International Conference on Web Information Systems Engineering, Brisbane, Australia, November 22-24, 2004, Proceedings, pp. 78-89, 2004, Springer, 3-540-23894-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Sarit Mukherjee, Sampath Rangarajan, John Lin, Sanjoy Paul |
User Identity Based Session Redirection in CDMA2000 Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), Networking and Services, 22-25 August 2004, Cambridge, MA, USA, pp. 105-110, 2004, IEEE Computer Society, 0-7695-2208-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Dae Hyun Yum, Pil Joong Lee |
Identity-Based Cryptography in Public Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 71-84, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Willy Susilo, Fangguo Zhang, Yi Mu 0001 |
Identity-Based Strong Designated Verifier Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 313-324, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Arun Ross, Anil K. Jain 0001 |
Biometrics: When Identity Matters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SINOBIOMETRICS ![In: Advances in Biometric Person Authentication, 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings, pp. 1-2, 2004, Springer, 3-540-24029-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin |
Identity-Based Zero Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 180-192, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Nwe Ni Tun, Satoshi Tojo |
Inheritance of Multiple Identity Conditions in Order-Sorted Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2004: Advances in Artificial Intelligence, 17th Australian Joint Conference on Artificial Intelligence, Cairns, Australia, December 4-6, 2004, Proceedings, pp. 1187-1193, 2004, Springer, 3-540-24059-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | David R. Millen, John F. Patterson |
Identity disclosure and the creation of social capital. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2003 Conference on Human Factors in Computing Systems, CHI 2003, Ft. Lauderdale, Florida, USA, April 5-10, 2003, pp. 720-721, 2003, ACM, 1-58113-637-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
virtual community and community computing, computer mediated communication, social computing and social navigation |
27 | Anantharaman Lakshminarayanan, Jianying Zhou 0001 |
FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 489-493, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Sergio Marti, Hector Garcia-Molina |
Identity Crisis: Anonymity vs. Reputation in P2P Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: 3rd International Conference on Peer-to-Peer Computing (P2P 2003), 1-3 September 2003, Linköping, Sweden, pp. 134-141, 2003, IEEE Computer Society, 0-7695-2023-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Matthias Baaz, Christian G. Fermüller |
A Note on the Proof-Theoretic Strength of a Single Application of the Schema of Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proof Theory in Computer Science ![In: Proof Theory in Computer Science, International Seminar, PTCS 2001, Dagstuhl Castle, Germany, October 7-12, 2001, Proceedings, pp. 38-48, 2001, Springer, 3-540-42752-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | S. Ben-Yacoub, Yousri Abdeljaoued, E. Mayoraz |
Fusion of face and speech data for person identity verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Neural Networks ![In: IEEE Trans. Neural Networks 10(5), pp. 1065-1074, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
27 | William Aiello, Sachin Lodha, Rafail Ostrovsky |
Fast Digital Identity Revocation (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 137-152, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority |
27 | Frank Eliassen, Randi Karlsen |
Interoperability and Object Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 20(4), pp. 25-29, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
27 | Gustavus J. Simmons, George B. Purdy |
Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings, pp. 35-49, 1988, Springer, 3-540-50251-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
25 | Sarbari Gupta |
Personal identity verification (PIV) cards as federated identities: challenges and opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 15-22, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance |
25 | Eve Maler, Drummond Reed |
The Venn of Identity: Options and Issues in Federated Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(2), pp. 16-23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Konstantin Hyppönen |
An Open Mobile Identity Tool: An Architecture for Mobile Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 207-222, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ben A. M. Schouten, Massimo Tistarelli, Carmen García-Mateo, Farzin Deravi, Martin Meints |
Nineteen Urgent Research Topics in Biometrics and Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOID ![In: Biometrics and Identity Management, First European Workshop, BIOID 2008, Roskilde, Denmark, May 7-9, 2008. Revised Selected Papers, pp. 228-235, 2008, Springer, 978-3-540-89990-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Liang Li, Wei-Qiang Jiang, Jie Tian 0001, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang 0001 |
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 129-132, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Soichi Kozai |
A Mental Space Account for Speaker's Empathy: Japanese Profiling Identity vs. English Shading Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONTEXT ![In: Modeling and Using Context, Second International and Interdisciplinary Conference, CONTEXT'99, Trento, Italy, September 1999, Proceedings, pp. 214-227, 1999, Springer, 3-540-66432-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
A generic construction of useful client puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 70-79, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
identity based KEM, security notions, useful client puzzle |
25 | M. Eric Johnson |
Data Hemorrhages in the Health-Care Sector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 71-89, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Health-care information, data leaks, security, identity theft |
25 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 276-292, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
25 | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(3), pp. 350-391, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Identity-based encryption, Random-oracle model, Foundations, Searchable encryption |
25 | R. J. Hulsebosch, P. W. G. Ebben |
Enhancing Face Recognition with Location Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 397-403, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, face recognition, Context, sensor fusion, identity verification |
25 | Darren J. Reed, Geraldine Fitzpatrick |
Acting Your Age in Second Life. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fun and Games ![In: Fun and Games, Second International Conference, Eindhoven, The Netherlands, October 20-21, 2008. Proceedings, pp. 158-169, 2008, Springer, 978-3-540-88321-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
age-identity, performativity, play, Second life, older users |
25 | Zeev Dvir, Amir Shpilka, Amir Yehudayoff |
Hardness-randomness tradeoffs for bounded depth arithmetic circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008, pp. 741-748, 2008, ACM, 978-1-60558-047-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bounded depth circuits, hardness-randomness tradeoffs, identity testing, lower bounds, arithmetic circuits |
25 | Ramaswamy Chandramouli |
Policy Specification and Enforcement for Smart ID Cards Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 127-134, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XML, Smart Cards, XSLT, Identity Management |
25 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek |
Concurrently-secure credential ownership proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 161-172, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
identity-based cryptography, signature schemes, identification schemes, credential systems, designated-verifier signatures |
25 | Dan Page, Frederik Vercauteren |
A Fault Attack on Pairing-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(9), pp. 1075-1080, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, identity based encryption, fault attack, Tate pairing |
25 | Jaeki Song, Yong Jin Kim |
Social influence process in the acceptance of a virtual community service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 8(3), pp. 241-252, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Subjective norms, Social comparison, Avatar, Social identity |
25 | Kayvan M. Lavassani, Bahar Movahedi, Vinod Kumar 0001 |
Identification in electronic networks: characteristics of e-identifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 216-224, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
electronic identification, electronic identifier, electronic networks, e-commerce, identity theft |
25 | Jin Li 0002, Fangguo Zhang, Yanming Wang |
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 362-371, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Public key encryption, Identity based, Bilinear groups |
25 | He Ge |
An Anonymous Authentication Scheme for Identification Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 238-248, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Anonymous Identification, Privacy, Cryptographic Protocol, Identity Management, Group Signature |
25 | Dickson K. W. Chiu, Changjie Wang, Ho-fung Leung, Irene Kafeza, Eleanna Kafeza |
Supporting the legal identities of contracting agents with an agent authorization platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 721-728, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
agent certificate, legal identity, intelligent agents, authorization, PKI, e-contract |
25 | John Sören Pettersson, Simone Fischer-Hübner, Ninni Danielsson, Jenny Nilsson, Mike Bergmann, Sebastian Clauß, Thomas Kriegelstein, Henry Krasemann |
Making PRIME usable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005, pp. 53-64, 2005, ACM, 1-59593-178-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
HCI, identity management, privacy-enhancing technologies |
25 | Zhenfeng Zhang, Dengguo Feng, Jing Xu 0002, Yongbin Zhou |
Efficient ID-Based Optimistic Fair Exchange with Provable Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 14-26, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Provable Security, Fair exchange, Identity-based Signature |
25 | Markus Rohde, Leonard Reinecke, Bernd Pape, Monique Janneck |
Community-Building with Web-Based Systems - Investigating a Hybrid Community of Students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Support. Cooperative Work. ![In: Comput. Support. Cooperative Work. 13(5-6), pp. 471-499, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
CommSy, communities of practice (COP), e-community-building, hybrid and self-organized community of students, qualitative interviews, social identity theory (SIT) |
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 200-211, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
25 | Heikki Ailisto, Mikko Lindholm, Satu-Marja Mäkelä, Elena Vildjiounaite |
Unobtrusive user identification with light biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordiCHI ![In: Proceedings of the Third Nordic Conference on Human-Computer Interaction 2004, Tampere, Finland, October 23-27, 2004, pp. 327-330, 2004, ACM, 1-58113-857-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
body fat percentage, privacy, verification, biometrics, identification, weight, identity theft, height |
25 | Kenji Imamoto, Kouichi Sakurai |
Key-Exchange Protocol Using Pre-agreed Session-ID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 375-387, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Diffie-Hellman based key exchange protocol, Identity concealment, Pre-shared key model, Pre-Agreed Session ID |
25 | Dae Hyun Yum, Pil Joong Lee |
Efficient Key Updating Signature Schemes Based on IBS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings, pp. 167-182, 2003, Springer, 3-540-20663-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Key insulated signature, intrusion resilient siganture, identity based signature |
24 | Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon |
The User-Centric Vision Matches Credentials Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 870-876, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Anis Chaari, Sylvie Lelandais, Mohamed Ben Ahmed |
A Pruning Approach Improving Face Identification Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, 2-4 September 2009, Genova, Italy, pp. 85-90, 2009, IEEE Computer Society, 978-0-7695-3718-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Lin Chen 0020, Xiaoqin Huang, Jinyuan You |
Certificate-Based Authentication and Authorization Architecture in Digital Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: International Collaboration and Cross-Fertilization, 7th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China, December 13-17, 2004, Proceedings, pp. 643, 2004, Springer, 3-540-24030-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jaewon Shin, Leonidas J. Guibas, Feng Zhao 0001 |
A Distributed Algorithm for Managing Multi-target Identities in Wireless Ad-hoc Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Information Processing in Sensor Networks, Second International Workshop, IPSN 2003, Palo Alto, CA, USA, April 22-23, 2003, Proceedings, pp. 223-238, 2003, Springer, 3-540-02111-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Rafael Accorsi |
Automated Privacy Audits to Complement the Notion of Control for Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDMAN ![In: Policies and Research in Identity Management - First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007, pp. 39-48, 2007, Springer, 978-0-387-77995-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Vasu S. Alagar, Kaiyu Wan |
Context Based Enforcement of Authorization for Privacy and Security in Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDMAN ![In: Policies and Research in Identity Management - First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007, pp. 25-37, 2007, Springer, 978-0-387-77995-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Gus Hosein |
Keynote Paper: Politics and Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDMAN ![In: Policies and Research in Identity Management - First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007, pp. 3-4, 2007, Springer, 978-0-387-77995-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 14619 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|