Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Marcos A. Simplício Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius Maciel da Silva |
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VNC ![In: 2018 IEEE Vehicular Networking Conference, VNC 2018, Taipei, Taiwan, December 5-7, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-9428-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
18 | Shahidatul Sadiah, Toru Nakanishi 0001, Nasima Begum, Nobuo Funabiki |
Accumulator for Monotone Formulas and its Application to Anonymous Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 25, pp. 949-961, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Caimei Wang, Yan Xiong, Wenjuan Cheng, Wenchao Huang, Huihua Xia, Jianmeng Huang |
A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 19(5), pp. 794-803, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Mohammad Khodaei, Hongyu Jin 0001, Panos Papadimitratos |
SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1707.05518, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman |
An efficient self-blindable attribute-based credential scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 115, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman |
An Efficient Self-blindable Attribute-Based Credential Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers, pp. 3-20, 2017, Springer, 978-3-319-70971-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Xueping Liang, Sachin Shetty, Lingchen Zhang, Charles A. Kamhoua, Kevin A. Kwiat |
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLOUD ![In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 25-30, 2017, pp. 302-309, 2017, IEEE Computer Society, 978-1-5386-1993-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Grant Ho, Aashish Sharma, Mobin Javed, Vern Paxson, David A. Wagner 0001 |
Detecting Credential Spearphishing in Enterprise Settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017., pp. 469-485, 2017, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
18 | Hiroaki Kikuchi, Koichi Niihara, Michihiro Yamada |
How Much is Risk Increased by Sharing Credential in Group? ![Search on Bibsonomy](Pics/bibsonomy.png) |
STM ![In: Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, pp. 103-117, 2017, Springer, 978-3-319-68062-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Harsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk |
An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIC ![In: 3rd IEEE International Conference on Collaboration and Internet Computing, CIC 2017, San Jose, CA, USA, October 15-17, 2017, pp. 421-428, 2017, IEEE Computer Society, 978-1-5386-2565-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
18 | Esther Palomar, Lorena González-Manzano, Almudena Alcaide, Álvaro Galán |
Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 10(2), pp. 60-68, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Florina Almenárez, M. Francisca Hinarejos, Andrés Marín, Josep Lluís Ferrer-Gomila, Daniel Díaz Sánchez |
PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 354, pp. 41-59, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Jongwon Choi, Geonbae Na, Jeong Hyun Yi |
Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 75(22), pp. 14833-14848, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner |
CREDENTIAL: Secure Cloud Identity Wallet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2016(106), 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Mohammad Khodaei, Panos Papadimitratos |
The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1601.00796, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Mohammad Khodaei, Hongyu Jin 0001, Panos Papadimitratos |
Towards Deploying a Scalable & Robust Vehicular Identity and Credential Management Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1601.00846, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Qi Jiang 0001, Jianfeng Ma 0001, Fushan Wei, Youliang Tian, Jian Shen 0001, Yuanyuan Yang |
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 76, pp. 37-48, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Nan Guo, Tianhan Gao, Hwagyoo Park |
Random oracle-based anonymous credential system for efficient attributes proof on smart devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 20(5), pp. 1781-1791, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Ashok Kumar Das |
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 9(1), pp. 223-244, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Nemmert, Detlef Hühnlein, Tobias Wich, Tina Hühnlein |
Architecture for Controlled Credential issuance Enhanced with Single Sign-On (ACCESSO). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2016, 13.-14. October 2016, Rome, Italy, pp. 67-79, 2016, GI. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
18 | Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng 0001, Youcheng Zhang, Jianying Zhou 0001 |
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016, pp. 141-151, 2016, ACM, 978-1-4503-4233-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Blake Butler, Brad Wardman, Nate Pratt |
REAPER: an automated, scalable solution for mass credential harvesting and OSINT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime ![In: 2016 APWG Symposium on Electronic Crime Research, eCrime 2016, Toronto, ON, Canada, June 1-3, 2016, pp. 71-80, 2016, IEEE, 978-1-5090-2922-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Shahidatul Sadiah, Toru Nakanishi 0001 |
Reduction of certificates in an anonymous credential system with proofs for monotone formulas on attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-TW ![In: IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016, Nantou County, Taiwan, May 27-29, 2016, pp. 1-2, 2016, IEEE, 978-1-5090-2073-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Felix Hörandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, Bernd Zwattendorfer |
CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016, pp. 742-749, 2016, IEEE Computer Society, 978-1-5090-0990-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, Simone Fischer-Hübner |
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, pp. 76-91, 2016, 978-3-319-55782-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang |
Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trustcom/BigDataSE/ISPA ![In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016, pp. 42-49, 2016, IEEE, 978-1-5090-3205-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Jeffry S. Babb, Mark J. Keith, Paul John Steinbart |
Can Relaxing Security Policy Restrictiveness Improve User Behavior? A Field Study of Authentication Credential Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 49th Hawaii International Conference on System Sciences, HICSS 2016, Koloa, HI, USA, January 5-8, 2016, pp. 4803-4812, 2016, IEEE Computer Society, 978-0-7695-5670-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
18 | Mobin Javed |
Detecting Credential Compromise in Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2016 |
RDF |
|
18 | Xuanxia Yao, Hong Liu 0006, Huansheng Ning, Laurence T. Yang, Yang Xiang 0001 |
Anonymous Credential-Based Access Control Scheme for Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Cloud Comput. ![In: IEEE Cloud Comput. 2(4), pp. 34-43, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Debiao He, Neeraj Kumar 0001, Naveen K. Chilamkurti |
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 321, pp. 263-277, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | SeongHan Shin, Kazukuni Kobara |
Hidden Credential Retrieval, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1), pp. 428-433, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Feng Diao, Fangguo Zhang, Xiangguo Cheng |
A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 6(1), pp. 461-467, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Norjihan Binti Abdul Ghani, Harihodin Selamat, Zailani Mohamed Sidek |
Credential Purpose-based Access Control for Personal Data Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Web Eng. ![In: J. Web Eng. 14(3&4), pp. 346-360, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Bin Lian, Gongliang Chen, Maode Ma, Jianhua Li 0001 |
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 10(3), pp. 543-557, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Haipeng Qu, Peng Shang, Xi Jun Lin, Lin Sun 0005 |
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 1066, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
18 | Tian-Fu Lee |
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 15(7), pp. 14960-14980, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Mohammad Khodaei, Panos Papadimitratos |
The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Veh. Technol. Mag. ![In: IEEE Veh. Technol. Mag. 10(4), pp. 63-69, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Balkis Hamdane, Sihem Guemara El Fatmi |
A credential and encryption based access control solution for named data networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IM ![In: IFIP/IEEE International Symposium on Integrated Network Management, IM 2015, Ottawa, ON, Canada, 11-15 May, 2015, pp. 1234-1237, 2015, IEEE, 978-3-901882-76-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Nasima Begum, Toru Nakanishi 0001, Yasuyuki Nogami |
Reduction of authentication time in an anonymous credential system with proofs for monotone formulas on attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-TW ![In: IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2015, Taipei, Taiwan, June 6-8, 2015, pp. 376-377, 2015, IEEE, 978-1-4799-8745-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Peter Snyder, Chris Kanich |
One Thing Leads to Another: Credential Based Privilege Escalation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015, pp. 135-137, 2015, ACM, 978-1-4503-3191-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen |
Formal Treatment of Privacy-Enhancing Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp. 3-24, 2015, Springer, 978-3-319-31300-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Mohamed Ali El-Serngawy, Chamseddine Talhi |
CaptureMe: Attacking the User Credential in Mobile Banking Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE/ISPA (1) ![In: 2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1, pp. 924-933, 2015, IEEE, 978-1-4673-7952-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Ahmad Sabouri |
A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE/ISPA (1) ![In: 2015 IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1, pp. 958-965, 2015, IEEE, 978-1-4673-7952-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Shahidatul Sadiah, Toru Nakanishi 0001, Nobuo Funabiki |
Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings, pp. 262-278, 2015, Springer, 978-3-319-22424-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
18 | Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older |
Banking on interoperability: Secure, interoperable credential management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 67, pp. 235-251, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jyh-haw Yeh |
The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 70(3), pp. 1100-1119, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Nan Guo, Jia Wang, Tianhan Gao, Kangbin Yim |
Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 4(1), pp. 37-46, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Muhamed Turkanovic, Marko Hölbl |
Notes on "A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 77(2), pp. 907-922, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Víctor Mateu, Francesc Sebé, Magda Valls |
Constructing credential-based E-voting systems from offline E-coin protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 42, pp. 39-44, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen |
Formal Treatment of Privacy-Enhancing Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 708, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Edelberto F. Silva, Natalia Castro Fernandes, Noemi de La Rocque Rodriguez, Débora C. Muchaluat-Saade |
Credential translations in Future Internet testbeds federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 2014 IEEE Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, May 5-9, 2014, pp. 1-6, 2014, IEEE, 978-1-4799-0912-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Benjamin Nopper |
Penetrationtesting mit Windows Credential Editor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STeP ![In: Software-Technologien und -Prozesse: IT-Sicherheit und Privatheit in Zeiten von Big Data. Tagungsband/Proceedings zur 4. Konferenz STeP 2014, Hochschule Furtwangen, pp. 49-58, 2014, De Gruyter Oldenbourg, 978-3-11-035865-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
18 | Jim Basney, Jeff Gaynor, Suresh Marru, Marlon E. Pierce, Thejaka Amila Kanewala, Rion Dooley, Joe Stubbs |
Integrating Science Gateways with XSEDE Security: A Survey of Credential Management Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XSEDE ![In: Annual Conference of the Extreme Science and Engineering Discovery Environment, XSEDE '14, Atlanta, GA, USA - July 13 - 18, 2014, pp. 58:1-58:2, 2014, ACM, 978-1-4503-2893-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Thejaka Amila Kanewala, Suresh Marru, Jim Basney, Marlon E. Pierce |
A Credential Store for Multi-tenant Science Gateways. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2014, Chicago, IL, USA, May 26-29, 2014, pp. 445-454, 2014, IEEE Computer Society, 978-1-4799-2783-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Nan Guo, Yuanting Jin, Kangbin Yim |
Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMIS ![In: Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2014, Birmingham, United Kingdom, 2-4 July, 2014, pp. 554-559, 2014, IEEE Computer Society, 978-1-4799-4333-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Ahmed Shiraz Memon, Jens Jensen, Ales Cernivec, Krzysztof Benedyczak, Morris Riedel |
Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UCC ![In: Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2014, London, United Kingdom, December 8-11, 2014, pp. 726-731, 2014, IEEE Computer Society, 978-1-4799-7881-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Shahidatul Sadiah, Toru Nakanishi 0001, Nobuo Funabiki |
Implementation of Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANDAR ![In: Second International Symposium on Computing and Networking, CANDAR 2014, Shizuoka, Japan, December 10-12, 2014, pp. 531-535, 2014, IEEE Computer Society, 978-1-4799-4152-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Aric A. Hagberg, Nathan Lemons, Alexander D. Kent, Joshua Neil |
Connected Components and Credential Hopping in Authentication Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SITIS ![In: Tenth International Conference on Signal-Image Technology and Internet-Based Systems, SITIS 2014, Marrakech, Morocco, November 23-27, 2014, pp. 416-423, 2014, IEEE Computer Society, 978-1-4799-7978-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Mohammad Khodaei, Hongyu Jin 0001, Panos Papadimitratos |
Towards deploying a scalable & robust vehicular identity and credential management infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VNC ![In: 2014 IEEE Vehicular Networking Conference, VNC 2014, Paderborn, Germany, December 3-5, 2014, pp. 33-40, 2014, IEEE, 978-1-4799-7660-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Fan Tseng, Wen-Tsuen Chen |
Anonymous Credential Scheme Supporting Active Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014, pp. 127-132, 2014, IEEE Computer Society, 978-1-4799-5733-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
18 | Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan, Mazhar Ali |
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 66(3), pp. 1687-1706, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Nasima Begum, Toru Nakanishi 0001, Nobuo Funabiki |
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12), pp. 2422-2433, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Pinaki Mitra, Rinku Das, Girish Sundaram |
Privatizing user credential information of Web services in a shared user environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1308.3482, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Chandra Sekhar Vorugunti, Mrudula Sarvabhatla |
Cryptanalysis of An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1311.3099, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Kaiping Xue, Changsha Ma, Peilin Hong, Rong Ding |
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 36(1), pp. 316-323, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri, Amir Moradi 0001 |
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 6(2), pp. 161-172, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng 0001 |
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 207, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
18 | Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee |
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 13(8), pp. 9589-9603, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Nan Guo, Jianju Cheng, Bin Zhang 0001, Kangbin Yim |
Aggregate Signature-Based Efficient Attributes Proof with Pairing-Based Anonymous Credential. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: 16th International Conference on Network-Based Information Systems, NBiS 2013, Seo-gu, Gwangju, CA, Korea (South), September 4-6, 2013, pp. 276-281, 2013, IEEE Computer Society, 978-0-7695-5052-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Jens Köhler, Jens Mittag, Hannes Hartenstein |
User-centric management of distributed credential repositories: balancing availability and vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 18th ACM Symposium on Access Control Models and Technologies, SACMAT '13, Amsterdam, The Netherlands, June 12-14, 2013, pp. 237-248, 2013, ACM, 978-1-4503-1950-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Debiao He, Neeraj Kumar 0001, Naveen K. Chilamkurti |
A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWPC ![In: International Symposium on Wireless and pervasive Computing, ISWPC 2013, Taipei, Taiwan, November 20-22, 2013, pp. 1-6, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven De Strycker |
Dedicated Hardware for Attribute-Based Credential Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings, pp. 50-65, 2013, Springer, 978-3-642-40778-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng 0001, Jianying Zhou 0001 |
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings, pp. 238-247, 2013, Springer, 978-3-319-27658-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi |
Active Credential Leakage for Observing Web-Based Attack Cycle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings, pp. 223-243, 2013, Springer, 978-3-642-41283-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | William Whyte, André Weimerskirch, Virendra Kumar, Thorsten Hehn |
A security credential management system for V2V communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VNC ![In: 2013 IEEE Vehicular Networking Conference, Boston, MA, USA, December 16-18, 2013, pp. 1-8, 2013, IEEE, 978-1-4799-2687-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Nasima Begum, Toru Nakanishi 0001, Nobuo Funabiki |
Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCCE ![In: IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013, Tokyo, Japan, 1-4 October 2013, pp. 530-533, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
18 | Mikaël Ates, Francesco Buccafurri, Jacques Fayolle, Gianluca Lax |
A warning on how to implement anonymous credential protocols into the information card framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 11(1), pp. 33-40, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati |
Minimising disclosure of client information in credential-based interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Priv. Secur. Integr. ![In: Int. J. Inf. Priv. Secur. Integr. 1(2/3), pp. 205-233, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Amang Sudarsono, Toru Nakanishi 0001, Nobuo Funabiki |
A Pairing-Based Anonymous Credential System with Efficient Attribute Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 20(3), pp. 774-784, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Isamu Teranishi, Jun Furukawa 0001 |
Anonymous Credential with Attributes Certification after Registration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1), pp. 125-137, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Jing Zhang 0027, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders |
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012, pp. 1-8, 2012, IEEE Computer Society, 978-1-4673-1624-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Mike Just, David Aspinall 0001 |
On the security and usability of dual credential authentication in UK online banking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012, pp. 259-264, 2012, IEEE, 978-1-4673-5325-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
18 | Christoph Fritsch, Günther Pernul |
User-Controlled Dynamic Access Credential Enrichment for Run-time Service Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: Ninth IEEE International Conference on e-Business Engineering, ICEBE 2012, Hangzhou, China, September 9-11, 2012, pp. 193-200, 2012, IEEE Computer Society, 978-1-4673-2601-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Kai Fischer, Jürgen Gessner, Steffen Fries |
Secure Identifiers and Initial Credential Bootstrapping for IoT@Work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMIS ![In: Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012, Palermo, Italy, July 4-6, 2012, pp. 781-786, 2012, IEEE Computer Society, 978-1-4673-1328-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Nasima Begum, Toru Nakanishi 0001, Nobuo Funabiki |
Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers, pp. 495-509, 2012, Springer, 978-3-642-37681-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Zachary J. Oster, Ganesh Ram Santhanam, Samik Basu 0001, Vasant G. Honavar |
Model Checking of Qualitative Sensitivity Preferences to Minimize Credential Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FACS ![In: Formal Aspects of Component Software, 9th International Symposium, FACS 2012, Mountain View, CA, USA, September 12-14, 2012. Revised Selected Papers, pp. 205-223, 2012, Springer, 978-3-642-35860-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Nasima Begum, Toru Nakanishi 0001, Nobuo Funabiki |
Implementation and Evaluation of an Pairing-Based Anonymous Credential System with Constant-Size Proofs and Efficient Proof Generations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: Third International Conference on Networking and Computing, ICNC 2012, Okinawa, Japan, December 5-7, 2012, pp. 264-268, 2012, IEEE Computer Society, 978-1-4673-4624-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Yan Zhang, Dengguo Feng |
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings, pp. 408-415, 2012, Springer, 978-3-642-34128-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Kin Ying Yu |
Efficient schemes for anonymous credential with reputation support ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
DOI RDF |
|
18 | Adam J. Lee |
Credential-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 271-272, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | |
Credential Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 270, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Soon Ae Chun, Joon Hee Kwon, Haesung Lee |
Social Credential-Based Role Recommendation and Patient Privacy Control in Medical Emergency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Model. Algorithms Medicine ![In: Int. J. Comput. Model. Algorithms Medicine 2(4), pp. 1-22, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Carlisle Adams |
Achieving non-transferability in credential systems using hidden biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 4(2), pp. 195-206, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Christopher Bayliss, Richard O. Sinnott, Wei Jie, Junaid Arshad |
The Design, Development and Application of a Proxy Credential Auditing Infrastructure for Collaborative Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCETECH ![In: E-Technologies: Transformation in a Connected World - 5th International Conference, MCETECH 2011, Les Diablerets, Switzerland, January 23-26, 2011, Revised Selected Papers, pp. 211-226, 2011, Springer, 978-3-642-20861-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Jeanno Chin Long Cheung, Tat Wing Chim, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui |
Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, GLOBECOM 2011, 5-9 December 2011, Houston, Texas, USA, pp. 1-5, 2011, IEEE, 978-1-4244-9266-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Krzysztof Sacha |
Complexity of credential processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCON ![In: Proceedings of EUROCON 2011, International Conference on Computer as a Tool, 27-29 April 2011, Lisbon, Portugal, pp. 1-4, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Stefan J. Zasada, Ali Nasrat Haidar, Peter V. Coveney |
Audited credential delegation: a usable identity management solution for grid environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TG ![In: Proceedings of the 2011 TeraGrid Conference - Extreme Digital Discovery, TG '11, Salt Lake City, Utah, USA, July 18-21, 2011, pp. 31:1-31:2, 2011, ACM, 978-1-4503-0888-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Kurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser |
Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings, pp. 45-58, 2011, Springer, 978-3-642-24711-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Marcus Hilbrich, Denis Hünich, René Jäkel |
A Security Approach for Credential-Management in Distributed Heterogeneous Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDC ![In: Intelligent Distributed Computing V - Proceedings of the 5th International Symposium on Intelligent Distributed Computing - IDC 2011, Delft, The Netherlands - October 2011, pp. 219-224, 2011, Springer, 978-3-642-24012-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Amang Sudarsono, Toru Nakanishi 0001, Nobuo Funabiki |
Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETS ![In: Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings, pp. 246-263, 2011, Springer, 978-3-642-22262-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|