|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5224 occurrences of 2354 keywords
|
|
|
Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Shintaro Mizuno, Kohji Yamada, Kenji Takahashi |
Authentication using multiple communication channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 54-62, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
internet, authentication, mobile phone, multiple channels |
23 | Basit Shafiq, Elisa Bertino, Arif Ghafoor |
Access control management in a distributed environment supporting dynamic collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 104-112, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
GTRBAC, collaboration, access control, trust management |
23 | Chou Chen Yang, Hung-Wen Yang, Hui-Chuan Huang |
A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 1198-1202, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
impersonate destination node attacks, packet forgery attacks, ad hoc networks, elliptic curve cryptography, hash chains, collision attacks, identity-based cryptosystem |
23 | Frank Schell, Andreas Schaf, Jochen Dinger, Hannes Hartenstein |
Assessing identity and access management systems based on domain-specific performance evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSP/SIPEW ![In: Proceedings of the first joint WOSP/SIPEW International Conference on Performance Engineering, San Jose, California, USA, January 28-30, 2010, pp. 253-254, 2010, ACM, 978-1-60558-563-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
identity and access management, simulation, performance evaluation |
23 | Elizabeth Barnes |
Indeterminacy, identity and counterparts: Evans reconsidered. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 168(1), pp. 81-96, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Vague identity, Ontic vagueness, Counterpart theory, Indeterminacy |
23 | Walid Karam, Chafic Mokbel, Hanna Greige, Gérard Chollet |
Audio-Visual Identity Verification and Robustness to Imposture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 796-805, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
audio-visual forgery, talking-face imposture, biometric verification robustness, Identity verification, face animation, voice conversion |
23 | Jung Yeon Hwang, Dong Hoon Lee 0001, Moti Yung |
Universal forgery of the identity-based sequential aggregate signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 157-160, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sequential aggregate signature, universal forgery, identity-based cryptography |
23 | Di Ma, Xiaodong Li, Wei Wang 0083, Wei Mao |
An application of host identity tags to DKIM for identifying signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 138-142, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DKIM (DomainKeys Identified Mail), HIT (Host Identity Tag), identification, DNS |
23 | Gulsum Zeynep Gurkas Aydin, Hakima Chaouchi, Abdul Halim Zaim |
eHIP: early update for Host Identity Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 6th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2009, Nice, France, September 2-4, 2009, 2009, ACM, 978-1-60558-536-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
early HIP, early update, handover latency, handover, anticipation, HIP, micro mobility, Host Identity Protocol |
23 | Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov |
A case study of enterprise identity management system adoption in an insurance organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHIMIT ![In: Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2009, Baltimore, Maryland, USA, November 7-8, 2009, 2009, ACM, 978-1-60558-572-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
case study, identity management, qualitative research, organizational factors, security tools |
23 | Grant A. Partridge, Pourang P. Irani |
IdenTTop: a flexible platform for exploring identity-enabled surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009, pp. 4411-4416, 2009, ACM, 978-1-60558-247-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
identity-enabled surfaces, multi-touch, tabletops |
23 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 196-214, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
23 | Georg Aichholzer, Stefan Strauß |
Understanding a complex innovation process: identity management in Austrian e-government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
D.GO ![In: Proceedings of the 10th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2009, Puebla, Mexico, May 17-20, 2009, pp. 230-239, 2009, Digital Government Research Center, 978-1-60558-535-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
electronic identity, privacy, e-government, process, innovation |
23 | S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan |
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 71-88, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multiple Receivers, Provable Security, Signcryption, Identity-Based Cryptography |
23 | S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan |
Identity Based Aggregate Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 378-397, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography |
23 | Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 |
Server-Controlled Identity-Based Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 214-229, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Key Exchange, Identity-based Cryptography |
23 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 61-75, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography |
23 | Khaled Masmoudi, Hossam Afifi |
Building identity-based security associations for provider-provisioned virtual private networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 39(3-4), pp. 215-222, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IPsec security associations, Internet key exchange protocol, Provider-provisioned VPNs, Applied identity-based cryptography |
23 | Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi |
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 60-73, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
standard model, identity-based cryptography, identification scheme |
23 | Mahabir Prasad Jhanwar, Rana Barua |
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 314-331, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Quadratic Residuosity Assumption, Pairing Map, IND-ID-CPA, Identity Based Encryption |
23 | Yongquan Cai, Xiuying Li |
Identity-Based Conference Key Distribution Scheme Using Sealed Lock. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 282-286, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Sealed Lock, Anonymity, Identity-based, Conference Key |
23 | Yeonjung Kang, Haeryong Park, Kilsoo Chun, Junghwan Song |
A Digital Identity Management Service Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 599-602, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IDSP, DIMM, User, Identity Management, SP |
23 | Nicola Venditti, Ovidiu Constantin |
Engineering the Complexity: The State of the Art of Identity and Access Management through the Lens of a Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 721-725, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Identity Management, Provisioning, Access Management |
23 | Jean Penny |
Amplified Breath - (Dis)Embodied Habitat: Exploring Sonic Interfaces of Performance, Electronics, Space and Flautist Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CMMR ![In: Computer Music Modeling and Retrieval. Genesis of Meaning in Sound and Music, 5th International Symposium, CMMR 2008, Copenhagen, Denmark, May 19-23, 2008, Revised Papers, pp. 243-252, 2008, Springer, 978-3-642-02517-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
flute, performance, identity, space, electronics |
23 | Alex Meredith, Mark Griffiths 0001, Monica T. Whitty |
Identity in massively multiplayer online games: a qualitative pilot study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria, pp. 543-546, 2008, ACM, 978-1-60558-349-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
massively multiplayer online games (MMOs), identity, qualitative, self-presentation |
23 | Chiu C. Tan 0001, Haodong Wang, Sheng Zhong 0002, Qun Li 0001 |
Body sensor network security: an identity-based cryptography approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 148-153, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, body sensor networks, identity-based cryptography |
23 | Ludwig Fuchs, Anton Preis |
BusiROLE: A Model for Integrating Business Roles into Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 128-138, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Business Roles, Identity Management, Compliance, IT security |
23 | Emilio Mordini |
Nothing to Hide Biometrics, Privacy and Private Sphere. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOID ![In: Biometrics and Identity Management, First European Workshop, BIOID 2008, Roskilde, Denmark, May 7-9, 2008. Revised Selected Papers, pp. 247-257, 2008, Springer, 978-3-540-89990-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Biometrics, Recognition, Identity |
23 | Liqun Chen 0002, Zhaohui Cheng, Nigel P. Smart |
Identity-based key agreement protocols from pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(4), pp. 213-241, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Identity based Crytography, Pairings |
23 | Daniel J. Weitzner |
Whose Name Is It, Anyway? Decentralized Identity Systems on the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 11(4), pp. 72-76, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Web identity, decentralized identification protocols, uniform resource identifiers, URI |
23 | Jean-Yves Béziau |
Sentence, proposition and identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Synth. ![In: Synth. 154(3), pp. 371-382, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Language, Identity, Syntax, Congruence, Formula, Sentence, Proposition |
23 | Jiejun Kong, Xiaoyan Hong, Mario Gerla |
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 6(8), pp. 888-902, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
identity-free routing, negligibility, network complexity theory, ad hoc network, Anonymity |
23 | Iris A. Junglas, Norman A. Johnson, Douglas J. Steel, Chon Abraham, Paul Mac Loughlin |
Identity formation, learning styles and trust in virtual worlds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 38(4), pp. 90-96, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
identity formation, social laboratories, trust, virtual world, learning style |
23 | Son Thanh Nguyen, Chunming Rong |
Electronic Payment Scheme Using Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 330-337, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
electronic wallet, Identity-based cryptography |
23 | Nobuaki Minematsu, Kyoko Sakuraba |
Development of a Femininity Estimator for Voice Therapy of Gender Identity Disorder Clients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Speaker Classification (2) ![In: Speaker Classification II, Selected Projects, pp. 22-33, 2007, Springer, 978-3-540-74121-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Gender identity disorder, femininity, voice therapy, vocal tract shape, GMM, speaker verification, fundamental frequency |
23 | Steven Gevers, Kristof Verslype, Bart De Decker |
Enhancing privacy in identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 60-63, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
microsoft cardspace, private credentials, security, privacy, identity managment systems |
23 | Toshihiko Matsuo |
Proxy Re-encryption Systems for Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 247-267, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proxy re-encryption system, public key encryption, identity-based encryption |
23 | Benjamin M. Gross, Elizabeth F. Churchill |
Addressing constraints: multiple usernames task spillage and notions of identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 2393-2398, 2007, ACM, 978-1-59593-642-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
interview study, usernames, collaboration, instant messaging, email, identity, task, identifier |
23 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Based Proxy Re-encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 189-202, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption, Proxy re-encryption |
23 | Sherman S. M. Chow, Kim-Kwang Raymond Choo |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 203-220, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reveal query, anonymity, provable security, Key agreement, identity-based cryptography |
23 | Zhu Wang, Huiyan Chen |
A Practical Identity-Based Signature Scheme from Bilinear Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 704-715, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ID reduction, bilinear map, Identity-based signature, message recovery |
23 | Ford-Long Wong, Hoon Wei Lim |
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 544-550, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Inter-domain authentication, secret public key, password, identity-based cryptography |
23 | E-yong Kim, Klara Nahrstedt, Li Xiao 0003, Kunsoo Park |
Identity-based registry for secure interdomain routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 321-331, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorized search, identity-based registry, verifiable search |
23 | Yiqun Chen, Willy Susilo, Yi Mu 0001 |
Identity-based anonymous designated ring signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 189-194, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, ad-hoc networks, peer-to-peer, anonymity, ring signature, identity-based |
23 | Hsinchun Chen, Homa Atabakhsh, Alan Gang Wang, Siddharth Kaza, Chunju Tseng, Yuan Wang, Shailesh Joshi, Tim Petersen, Chuck Violette |
COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, California, USA, May 21-24, 2006, pp. 49-50, 2006, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
border safety, identity matching, naïve bayes model, data mining, semi-supervised learning, mutual information, law enforcement, homeland security, intelligence and security informatics |
23 | Xavier Boyen, Qixiang Mei, Brent Waters |
Direct chosen ciphertext security from identity-based techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 320-329, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
identity-based encryption, chosen ciphertext security |
23 | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Ring Signature: Why, How and What Next. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 144-161, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
spontaneous anonymous group signature, bilinear pairings, PKI, Identity based cryptography, ring signature |
23 | Thomas Bieger, Pietro Beritelli, Robert Weinert, Andreas Wittmer |
Building Trust and Identity on the Web - New IT Transaction Platforms to Overcome Psychological Barriers to Rent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ENTER ![In: Information and Communication Technologies in Tourism, ENTER 2005, Proceedings of the International Conference in Innsbruck, Austria, 2005, pp. 296-305, 2005, Springer, 978-3-211-24148-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
second-home market, rental business, trust, identity, web-platforms |
23 | Wesley Shumar, Craig Bach |
Negotiating identity in the math forum's online mentoring project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2005, Denver, CO, USA, June 7-11, 2005, Proceedings, pp. 399, 2005, ACM, 1-58113-876-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
identity, mentoring, mathematics education |
23 | Manindra Agrawal, Somenath Biswas |
Primality and identity testing via Chinese remaindering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 50(4), pp. 429-443, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Primality testing, polynomial identity testing |
23 | Bill McCarty |
Automated Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(5), pp. 89-92, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
23 | Song Han 0004, Winson K. Y. Yeung, Jie Wang 0038 |
Identity-based confirmer signatures from pairings over elliptic curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), San Diego, California, USA, June 9-12, 2003, pp. 262-263, 2003, ACM, 1-58113-679-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
elliptic curve discrete logarithms, identity-based signatures, Weil pairing, computational Diffie-Hellman problem |
23 | Roberta Lamb, Elizabeth J. Davidson |
Social Scientists: Managing Identity in Socio-technical Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 99, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
social actor, ICT, identity, web page, socio-technical network |
23 | Manindra Agrawal, Somenath Biswas |
Primality and Identity Testing via Chinese Remaindering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 40th Annual Symposium on Foundations of Computer Science, FOCS '99, 17-18 October, 1999, New York, NY, USA, pp. 202-209, 1999, IEEE Computer Society, 0-7695-0409-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Primality testing, Polynomial identity testing |
23 | Kazuhiko Kato, Takashi Masuda |
Persistent Caching: An Implementation Technique for Complex Objects with Object Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 18(7), pp. 631-645, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
persistent caching, complex object database systems, object identifier, navigation operation, database management systems, buffer storage, file organisation, hashed table, complex objects, update propagation, object identity, implementation technique |
22 | Kristy Elizabeth Boyer, E. Nathan Thomas, Audrey Smith Rorrer, Deonte Cooper, Mladen A. Vouk |
Increasing technical excellence, leadership and commitment of computing students through identity-based mentoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 167-171, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
computing pipeline, project-based initiatives, diversity, mentoring, broadening participation |
22 | Tanasai Sucontphunt, Zhigang Deng, Ulrich Neumann |
3D human face identity transfer using deformation gradient. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH Posters ![In: International Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 2010, Los Angeles, California, USA, July 26-30, 2010, Poster Proceedings, pp. 102:1, 2010, ACM, 978-1-4503-0393-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Christopher Staite |
Portable secure identity management for software engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (2) ![In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, pp. 325-326, 2010, ACM. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Paul Bell, Igor Potapov |
The Identity Correspondence Problem and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 20th International Symposium, ISAAC 2009, Honolulu, Hawaii, USA, December 16-18, 2009. Proceedings, pp. 657-667, 2009, Springer, 978-3-642-10630-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Xu An Wang 0001, Xiaoyuan Yang 0002 |
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 657-660, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Guang Xiang, Jason I. Hong |
A hybrid phish detection approach by identity discovery and keywords retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 571-580, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information retrieval, named entity recognition, anti-phishing |
22 | Craig Gentry, Shai Halevi |
Hierarchical Identity Based Encryption with Polynomially Many Levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 437-456, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Joseph K. Liu, Jianying Zhou 0001 |
An Efficient Identity-Based Online/Offline Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 156-167, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Federica Paci, Rodolfo Ferrini, Elisa Bertino |
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 535-542, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Regina N. Hebig, Christoph Meinel, Michael Menzel 0001, Ivonne Thomas, Robert Warschofsky |
A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 551-558, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai |
Generic Construction of Stateful Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 338-346, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshinobu Kawabe |
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 42-51, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Florina Almenárez, Patricia Arias, Andrés Marín, Daniel Díaz Sánchez |
Towards dynamic trust establishment for identity federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2009 Euro American conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, EATIS 2009, Prague, Czech Republic, June 3-5, 2009, pp. 25, 2009, 978-1-60558-398-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Sebastian Rieger |
User-Centric Identity Management in Heterogeneous Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Fourth International Conference on Internet and Web Applications and Services, ICIW 2009, 24-28 May 2009, Venice/Mestre, Italy, pp. 527-532, 2009, IEEE Computer Society, 978-0-7695-3613-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar |
Security Usability of Petname Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 44-59, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Rachna Dhamija, Lisa Dusseault |
The Seven Flaws of Identity Management: Usability and Security Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(2), pp. 24-29, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Mizuho Iwaihara, Kohei Murakami, Gail-Joon Ahn, Masatoshi Yoshikawa |
Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER ![In: Conceptual Modeling - ER 2008, 27th International Conference on Conceptual Modeling, Barcelona, Spain, October 20-24, 2008. Proceedings, pp. 183-198, 2008, Springer, 978-3-540-87876-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Ye Ning, Terence Sim |
Smile, you're on identity camera. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 19th International Conference on Pattern Recognition (ICPR 2008), December 8-11, 2008, Tampa, Florida, USA, pp. 1-4, 2008, IEEE Computer Society, 978-1-4244-2175-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Zhongren Liu, Li Xu 0002, Zhide Chen, Yi Mu 0001, Fuchun Guo |
Hierarchical Identity-Based Online/Offline Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2115-2119, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Faizal Arya Samman, Thomas Hollstein, Manfred Glesner |
Flexible parallel pipeline network-on-chip based on dynamic packet identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Wenbo Zhang, Hongqi Zhang, Bin Zhang 0015, Yan Yang |
An Identity-Based Authentication Model for Multi-domain in Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 165-169, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Malika Izabachène, David Pointcheval |
New Anonymity Notions for Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 375-391, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Elizabeth Papadopoulou, Sarah McBurney, Nick K. Taylor, M. Howard Williams |
Linking Privacy and User Preferences in the Identity Management for a Pervasive System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2008 IEEE / WIC / ACM International Conference on Web Intelligence, WI 2008, 9-12 December 2008, Sydney, NSW, Australia, Main Conference Proceedings, pp. 192-195, 2008, IEEE Computer Society, 978-0-7695-3496-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen |
A content-driven access control system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 26-35, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, secret sharing, revocation, inference control, attribute-based encryption |
22 | Anthony W. Hager, D. G. Johnson |
Adjoining an Identity to a Reduced Archimedean f -ring, II: Algebras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Categorical Struct. ![In: Appl. Categorical Struct. 15(1-2), pp. 35-47, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) Primary 06F20, 13B10, Secondary 18A40, 54H10, 46A40, 54C30, 06F25 |
22 | Pete Bramhall, Marit Hansen, Kai Rannenberg, Thomas Roessler |
User-Centric Identity Management: New Trends in Standardization and Regulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(4), pp. 84-87, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Pierre Parrend, Samuel Galice, Stéphane Frénot, Stéphane Ubéda |
Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 193-200, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Evangelos Kotsovinos, Ingo Friese, Martin Kurze, Jörg Heuer |
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 289-300, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Orhan Cetinkaya, Ali Doganaksoy |
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1190-1196, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 392-406, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ID-based Encryption, Pairing |
22 | N. Klingenstein |
Attribute Aggregation and Federated Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 26, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart |
Identity-Based Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 361-376, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Stephen Herborn, Andreas Huber, Roksana Boreli, Aruna Seneviratne |
Secure Host Identity Delegation for Mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), January 7-12, 2007, Bangalore, India, 2007, IEEE, 1-4244-0614-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Hyun-Chul Choi, Se-Young Oh |
Facial Identity and Expression Recognition by using Active Appearance Model with Efficient Second Order Minimization and Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIRA ![In: Proceedings of the 7th IEEE International Symposium on Computational Intelligence in Robotics and Automation, CIRA 2007, 20-23 June 2007, Jacksonville, Florida, USA, pp. 131-136, 2007, IEEE, 1-4244-0790-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Rupeng Li, Jia Yu 0005, Guowen Li, Daxing Li |
A New Identity-Based Blind Signature Scheme with Batch Verifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 1051-1056, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel |
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 519-524, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Zsolt Kovacshazi, Rolland Vida |
Host Identity Specific Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 1, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Liam Peyton, Chintan Doshi, Pierre Seguin |
An audit trail service to enhance privacy compliance in federated identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2007 conference of the Centre for Advanced Studies on Collaborative Research, October 22-25, 2007, Richmond Hill, Ontario, Canada, pp. 175-187, 2007, IBM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | G. A. Wang, H. Chen, J. J. Xu, H. Atabakhsh |
Automatically detecting criminal identity deception: an adaptive detection algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 36(5), pp. 988-999, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Clifton Phua, Ross W. Gayler, Kate Smith-Miles, Vincent C. S. Lee |
Communal Detection of Implicit Personal Identity Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 620-625, 2006, IEEE Computer Society, 0-7695-2702-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Pietro Michiardi, Refik Molva |
Identity Based Message Authentication for Dynamic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 50-61, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Joey J. Lee, Christopher M. Hoadley |
Online Identity as a Leverage Point for Learning in Massively Multiplayer Online Role Playing Games (MMORPGs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, ICALT 2006, Kerkrade, The Netherlands, July 5-7, 2006, pp. 761-763, 2006, IEEE Computer Society, 0-7695-2632-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jun Zhao 0003, Carole A. Goble, Robert Stevens 0001 |
An Identity Crisis in the Life Sciences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPAW ![In: Provenance and Annotation of Data, International Provenance and Annotation Workshop, IPAW 2006, Chicago, IL, USA, May 3-5, 2006, Revised Selected Papers, pp. 254-269, 2006, Springer, 3-540-46302-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Kenneth G. Paterson, Jacob C. N. Schuldt |
Efficient Identity-Based Signatures Secure in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 207-222, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Key-Insulated Signature Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 470-480, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
|
|