|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5224 occurrences of 2354 keywords
|
|
|
Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
39 | Kalman C. Toth, Ann Cavoukian, Alan Anderson-Priddy |
Privacy by Design Architecture Composed of Identity Agents Decentralizing Control over Digital Identity. |
Open Identity Summit |
2020 |
DBLP DOI BibTeX RDF |
|
39 | Michael Kubach, Christian H. Schunck, Rachelle Sellung, Heiko Roßnagel |
Self-sovereign and Decentralized identity as the future of identity management? |
Open Identity Summit |
2020 |
DBLP DOI BibTeX RDF |
|
39 | Costantina Caruso, Andrea Dimitri, Massimo Mecella |
Identity Mining vs Identity Discovering: a new approach. |
Open Identity Summit |
2016 |
DBLP BibTeX RDF |
|
39 | Sebastian Kurowski |
Economic issues of federated identity management - an estimation of the costs of identity lifecycle management in inter-organisational information exchange using transaction cost theory. |
Open Identity Summit |
2015 |
DBLP BibTeX RDF |
|
39 | Sanjit Chatterjee, Palash Sarkar 0001 |
Identity-Based Encryption and Hierarchical Identity-Based Encryption. |
Identity-Based Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
39 | Thierry Nabeth |
Identity of Identity. |
The Future of Identity in the Information Society |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Makoto Hatakeyama, Shigeyoshi Shima |
Privilege federation between different user profiles for service federation. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
privilege management, access control, identity federation |
38 | Stefan Berthold, Sebastian Clauß |
Linkability estimation between subjects and message contents using formal concepts. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
anonymity, data analysis, information management, identity management, privacy-enhancing technology, concept analysis, unlinkability |
38 | Sebastian Clauß, Stefan Schiffner |
Structuring anonymity metrics. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
anonymity metrics, privacy metrics, identity management |
38 | António Lacerda |
The signs and the corporate identity in contemporary society. |
SIGDOC |
2008 |
DBLP DOI BibTeX RDF |
corporate identity, organizational identity, communication design |
38 | Gideon Ranga, Stephen Flowerday |
Identity and access management for the distribution of social grants in South Africa. |
SAICSIT |
2007 |
DBLP DOI BibTeX RDF |
federated and isolated identity management architectures, identity and access management, authentication, authorisation |
38 | Wenjie Wang, Yufei Yuan, Norman P. Archer |
A Contextual Framework for Combating Identity Theft. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
identity authentication, risk analysis, security and privacy, Identity theft, multi-party interaction |
38 | Alapan Arnab, Andrew Hutchison |
Verifiable digital object identity system. |
Digital Rights Management Workshop |
2006 |
DBLP DOI BibTeX RDF |
data identity, handle system, vdoi, digital signatures, identifier, identity verification |
38 | Uwe Jendricke, Daniela Gerd tom Markotten |
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
security mechanism usability, protection goals, personal security assistant, security functions configuration, security functionality, user identity selection, inexperienced users, security needs negotiation, Internet, user interfaces, user interface, human factors, Identity-Manager, personal computing, Internet applications, authorisation, telecommunication security |
38 | Matthew Rowe 0001 |
The credibility of digital identity information on the social web: a user study. |
WICOW |
2010 |
DBLP DOI BibTeX RDF |
social web, digital identity, information credibility |
38 | Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J. Mitchell |
CardSpace-liberty integration for CardSpace users. |
IDtrust |
2010 |
DBLP DOI BibTeX RDF |
Liberty Alliance project, browser extension, interoperability, identity management, SAML, CardSpace |
38 | Ning Shang, Federica Paci, Elisa Bertino |
Efficient and privacy-preserving enforcement of attribute-based access control. |
IDtrust |
2010 |
DBLP DOI BibTeX RDF |
Agg-EQ-OCBE, privacy, identity |
38 | Susan Landau 0001, Hubert Lê Van Gông, Robin Wilton |
Achieving Privacy in a Federated Identity Management System. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
privacy, policy, law, federated identity management |
38 | Bob Hulsebosch, Robert de Groote, Martin Snijders |
Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management. (PDF / PS) |
AIMS |
2009 |
DBLP DOI BibTeX RDF |
lightpath provisioning, trust, identity management, federation, User centric, network resources |
38 | D. Fox Harrell |
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming. |
Creativity & Cognition |
2009 |
DBLP DOI BibTeX RDF |
cognitive categorization, social classification, stigma, social networking, gaming, empowerment, social identity |
38 | David Galindo, Flavio D. Garcia |
A Schnorr-Like Lightweight Identity-Based Signature Scheme. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Schnorr, provable security, random oracle model, identity-based signature, lightweight cryptography |
38 | Giovanni Di Crescenzo |
On the Statistical Dependency of Identity Theft on Demographics. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
US Demographics, Statistics, Regression Analysis, Identity Theft |
38 | Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, Kevin J. Steuer |
A Federated Digital Identity Management Approach for Business Processes. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
naming heterogeneity, interoperability, business process, identity management |
38 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Undeniable Signatures, Identity-based, Convertible |
38 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino |
Privacy Requirements in Identity Management Solutions. |
HCI (9) |
2007 |
DBLP DOI BibTeX RDF |
Social and Legal Concerns, Security, Privacy, Identity Management |
38 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
38 | G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Chunju Tseng, Homa Atabakhsh, Hsinchun Chen |
The Arizona IDMatcher: developing an identity matching tool for law enforcement. |
DG.O |
2007 |
DBLP BibTeX RDF |
identity matching, probabilistic algorithm, entity matching |
38 | Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson |
What can identity-based cryptography offer to web services? |
SWS |
2007 |
DBLP DOI BibTeX RDF |
message-level security, web services, identity-based cryptography |
38 | G. Alan Wang, Hsinchun Chen, Homa Atabakhsh |
A probabilistic model for approximate identity matching. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
identity matching, naïve bayes model, semi-supervised learning |
38 | Kim Luong |
The other side of identity theft: not just a financial concern. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security, identity theft |
38 | E. Axel Larsson |
A case study: implementing novell identity management at Drew University. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
DirXML, eDirectory, identity management, single sign on, directory services, active directory, novell, password management |
38 | Joon S. Park, Harish S. Krishnan |
Trusted Identity and Session Management Using Secure Cookies. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
.NET Passport, Identity Management, Cookies |
38 | Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 |
An Identity-Based Grid Security Infrastructure Model. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
Identity Cryptography, Public Key Infrastructure, Security Group Communication |
38 | Zhenfeng Zhang, Jing Xu 0002, Dengguo Feng |
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Security protocol, Fair exchange, Identity-based signature, Certified E-mail |
38 | Gerhard Jakisch |
E-Signature versus E-Identity the Creation of the Digital Citizen. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
e-Signature, e-Identity, digital citizen, e-address, email address, technical solution, administrative requirements, administrative processes, advanced electronic signature, e-commerce, e-Government, government data processing, holistic approach, public authorities |
38 | Gus Lopez, Bjørn N. Freeman-Benson, Alan Borning |
Constraints and Object Identity. |
ECOOP |
1994 |
DBLP DOI BibTeX RDF |
constraint imperative programming, Kaleidoscope, constraints, aliasing, object identity |
37 | Jiexun Li, G. Alan Wang, Hsinchun Chen |
PRM-based identity matching using social context. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Ludwig Fuchs, Günther Pernul |
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Jennifer Seberry, Xinyi Huang 0001 |
Identity-Based Proxy Signature from Pairings. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
anonymous signatures, group signatures, ring signatures |
37 | Rodger Jamieson, Donald Winchester, Stephen Smith 0001 |
Development of a Conceptual Framework for Managing Identity Fraud. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
37 | G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen |
The Arizona IDMatcher: A Probabilistic Identity Matching System. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Jörn Altmann, Rajarajan Sampath |
UNIQuE: A User-Centric Framework for Network Identity Management. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino |
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Joonsang Baek, Yuliang Zheng 0001 |
Identity-Based Threshold Decryption. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Dan Boneh, Xavier Boyen |
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Oliver Berthold, Marit Köhntopp |
Identity Management Based on P3P. |
Workshop on Design Issues in Anonymity and Unobservability |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Piotr Pacyna, Anthony M. Rutkowski, Amardeo Sarma, Kenji Takahashi |
Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems. |
Computer |
2009 |
DBLP DOI BibTeX RDF |
Digital identity, Security & privacy, Identity management systems |
36 | Antonio Fernandez Gómez-Skarmeta, Pedro Martinez-Julia, Joao Girão, Amardeo Sarma |
Identity based architecture for secure communication in future internet. |
Digital Identity Management |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Massimo Tistarelli, Enrico Grosso |
Identity Management in Face Recognition Systems. |
BIOID |
2008 |
DBLP DOI BibTeX RDF |
pattern recognition, computer vision, face recognition, biometrics, identity management |
35 | Craig Gentry, Alice Silverberg |
Hierarchical ID-Based Cryptography. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
hierarchical identity-based cryptography, elliptic curves, identity-based cryptography, pairing-based cryptography |
35 | Liang Yan, Chunming Rong, Gansen Zhao |
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. |
CloudCom |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Marc Barisch, Alfredo Matos |
Integrating user Identity Management systems with the Host Identity Protocol. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Corinne S. Irwin, Dennis C. Taylor |
Identity, credential, and access management at NASA, from Zachman to attributes. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS) |
35 | Simon J. D. Prince, Jania Aghajanian, Umar Mohammed, Maneesh Sahani |
Latent Identity Variables: Biometric Matching Without Explicit Identity Estimation. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
Face Recognition, Biometrics, Bayesian Methods |
35 | Zhaohui Cheng, Liqun Chen 0002, Richard Comley, Qiang Tang 0001 |
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Sebastian Gajek, Jörg Schwenk, Michael Steiner 0001, Chen Xuan |
Risks of the CardSpace Protocol. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
analysis, identity management, CardSpace |
35 | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik |
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes |
34 | G. Alan Wang, Jennifer Jie Xu 0001, Hsinchun Chen |
Using Social Contextual Information to Match Criminal Identities. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Takumi Akahoshi, Manabu Okamoto, Michio Shimomura, Naohisa Komatsu |
Improving the safety and practicality of authorization technology using LOAF. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
authentication, access control, identity management, openid |
34 | Brendan Francis O'Connor, John Linwood Griffin |
Mnikr: reputation construction through human trading of distributed social identities. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
digital persona, social networking, reputation, identity, stock market |
34 | Phillip J. Windley, Devlin Daley, Bryant Cutler, Kevin Tew |
Using reputation to augment explicit authorization. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
framework, blogging, reputation, identity |
34 | Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bertino |
Receipt management- transaction history based trust establishment. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, identity |
33 | Frank Schell, Jochen Dinger, Hannes Hartenstein |
Performance Evaluation of Identity and Access Management Systems in Federated Environments. |
Infoscale |
2009 |
DBLP DOI BibTeX RDF |
identity and access management, scalability, access control, federated identity management |
33 | Markus Bylund, Kristina Höök, Alina Pommeranz |
Pieces of identity. |
NordiCHI |
2008 |
DBLP DOI BibTeX RDF |
privacy, cultural probes, digital identity, social identity |
33 | Aleksej Jerman Blazic, Kajetan Dolinar, Jan Porekar |
Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques. |
ICDS |
2007 |
DBLP DOI BibTeX RDF |
Policy negotiation, Privacy, Trust management, Identity management, Pervasive systems, Personal information, Virtual identity |
33 | Katrin Borcea-Pfitzmann, Elke Franz 0001, Andreas Pfitzmann |
Usable presentation of secure pseudonyms. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
(un)linkability, digital pseudonyms, privacy, usability, names, mnemonics |
33 | Yu Chen 0003, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen 0001 |
Identity-based encryption based on DHIES. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
DHIES, combination, identity-based encryption, bilinear map |
33 | Mads Schaarup Andersen |
Architectural mismatch issues in identity management deployment. |
ECSA Companion Volume |
2010 |
DBLP DOI BibTeX RDF |
architectural mismatch, architectural prototyping, COTS, identity management, provisioning |
33 | Lein Harn, Jian Ren 0001, Changlu Lin |
Efficient identity-based GQ multisignatures. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
ISO/IEC standard, Public-key cryptography, Identity-based signature, Multisignature |
33 | Tossapon Boongoen, Qiang Shen 0001 |
Intelligent hybrid approach to false identity detection. |
ICAIL |
2009 |
DBLP DOI BibTeX RDF |
false identity detection, terrorist data, link analysis, hybrid algorithm |
33 | John Dunagan, Alice X. Zheng, Daniel R. Simon |
Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs. |
SOSP |
2009 |
DBLP DOI BibTeX RDF |
identity snowball, machine learning, support vector machine, authentication, access control, combinatorial optimization, attack graph, sparsest cut |
33 | Carman Neustaedter, Elena A. Fedorovskaya |
Presenting identity in a virtual world through avatar appearances. |
Graphics Interface |
2009 |
DBLP BibTeX RDF |
virtual worlds, avatar, identity, appearance |
33 | David Oyarzun, Amalia Ortiz, Maria del Puy Carretero, Alex García-Alonso |
Creating the Goodies and Baddies of the Story: Specification of an Interoperable and Reusable Avatar Identity. |
ICIDS |
2009 |
DBLP DOI BibTeX RDF |
standardization, Virtual characters, virtual identity |
33 | David W. Chadwick |
FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
information cards, authorisation, federated identity management, X.509 certificates, CardSpace |
33 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon 0001, Nikhil Swamy |
Verified implementations of the information card federated identity-management protocol. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
cryptographic protocol verification, verified implementations, web services security, federated identity management, CardSpace |
33 | Mari W. Buche |
Influence of gender on IT professional work identity: outcomes from a PLS study. |
CPR |
2008 |
DBLP DOI BibTeX RDF |
intent to leave, work identity, theory, IT workforce, job satisfaction, gender issues, IT profession |
33 | Ivonne Thomas, Michael Menzel 0001, Christoph Meinel |
Using quantified trust levels to describe authentication requirements in federated identity management. |
SWS |
2008 |
DBLP DOI BibTeX RDF |
authentication and access control, trust levels, web service federation, trust management, federated identity management |
33 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
threshold key-insulation, standard model, identity-based encryption, key-exposure |
33 | Zohar Shay Karnin, Amir Shpilka |
Black Box Polynomial Identity Testing of Generalized Depth-3 Arithmetic Circuits with Bounded Top Fan-In. |
CCC |
2008 |
DBLP DOI BibTeX RDF |
PIT, depth-3, arithmetic circuit, deterministic, polynomial identity testing |
33 | Waleed A. Alrodhan, Chris J. Mitchell |
A client-side CardSpace-Liberty integration architecture. |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
Liberty, integration, identity management, federation, CardSpace |
33 | Xuefeng Wen |
A Propositional Logic with Relative Identity Connective and a Partial Solution to the Paradox of Analysis. |
Stud Logica |
2007 |
DBLP DOI BibTeX RDF |
relative identity, paradox of analysis, hyperintensional logic, context |
33 | Fagen Li, Yupu Hu, Chuanrong Zhang |
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
identity-based signcryption, Ad hoc networks, provable security, bilinear pairings |
33 | Katrin Hoeper, Guang Gong |
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. |
ADHOC-NOW |
2006 |
DBLP DOI BibTeX RDF |
Identity-Based Schemes, Key Renewal, Neighborhood Monitoring, Mobile Ad Hoc Networks, Revocation |
33 | Frederic Stutzman, Terrell Russell |
ClaimID: a system for personal identity management. |
JCDL |
2006 |
DBLP DOI BibTeX RDF |
personal identity management, folksonomy |
33 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Short (Identity-Based) Strong Designated Verifier Signature Schemes. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
strong designated verifier signature scheme, random oracle model, short signature, identity based, designated verifier signature |
33 | Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen |
An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
pairings, Signcryption, identity-based cryptography |
33 | Greg Goth |
Identity Management, Access Specs are Rolling Along. |
IEEE Internet Comput. |
2005 |
DBLP DOI BibTeX RDF |
network identity management, single sign on, access management |
33 | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Delegation Network. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
Delegation network, bilinear pairings, proxy signature, identity-based cryptography, batch verification |
33 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption |
33 | Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette |
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. |
DG.O |
2005 |
DBLP BibTeX RDF |
identity matching, data mining, social network analysis, law enforcement, homeland security |
33 | Manuel Barbosa, Pooya Farshim |
Efficient Identity-Based Key Encapsulation to Multiple Parties. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Key Encapsulation Mechanism (KEM), Provable Security, Identity Based Cryptography, Hybrid Encryption |
33 | Noel McCullagh, Paulo S. L. M. Barreto |
A New Two-Party Identity-Based Authenticated Key Agreement. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
bilinear maps, Tate pairing, identity-based cryptography, authenticated key agreement |
33 | Zhenjie Huang, Kefei Chen, Yumin Wang |
Efficient Identity-Based Signatures and Blind Signatures. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Gap Diffie-Hellman group, Signature, Bilinear pairings, Blind signature, Identity-based |
33 | Joonsang Baek, Yuliang Zheng 0001 |
Identity-Based Threshold Signature Scheme from the Bilinear Pairings. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
Identity-based threshold signature, Generalized Bilinear Problem, Bilinear Pairing, Verifiable secret-sharing, Chosen message attack |
33 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
Secure Hierarchical Identity Based Signature and Its Application. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Hierarchical identity-based signature, forward-secure signature, bilinear pairings |
33 | Florian Hess |
Efficient Identity Based Signature Schemes Based on Pairings. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
Tate pairing, key escrow, Identity based signatures, Weil pairing |
33 | K. C. Reddy, Divya Nalla |
Identity Based Authenticated Group Key Agreement Protocol. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing |
33 | Marina Umaschi Bers, Joseph Gonzalez-Heydrich, David Ray DeMaso |
Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis. |
CHI |
2001 |
DBLP DOI BibTeX RDF |
dialysis, pediatric patients, storytelling, virtual communities, identity, therapy, multi-user virtual environment |
33 | Sherry M. B. Thatcher |
The Mediating Role of Identity Fit: Understanding the Relationship between Communication Media, Demographic Differences, and Creativity. |
HICSS |
2001 |
DBLP DOI BibTeX RDF |
identity fit, demographic differences, creativity, communication media |
Displaying result #101 - #200 of 14619 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|