|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 72 occurrences of 46 keywords
|
|
|
Results
Found 107 publication records. Showing 107 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Ryu Watanabe, Toshiaki Tanaka |
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 435-442, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ID federation, mobile PKI, network security, privacy protection |
24 | HwanJin Lee, InKyung Jeun, Hyun Cheol Jeong, Junghwan Song |
Analysis of the OPENID from a privacy law perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IADIS AC (1) ![In: Proceedings of the IADIS International Conference Applied Computing 2009, 19-21 November, Rome, Italy, 2 Volumes, pp. 209-216, 2009, IADIS Press, 978-972-8924-97-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
23 | Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle |
Preventing identity theft with electronic identity cards and the trusted platform module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009, pp. 44-51, 2009, ACM, 978-1-60558-472-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication with TPM, electronic ID, identity system |
23 | Sebastian Rieger |
User-Centric Identity Management in Heterogeneous Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Fourth International Conference on Internet and Web Applications and Services, ICIW 2009, 24-28 May 2009, Venice/Mestre, Italy, pp. 527-532, 2009, IEEE Computer Society, 978-0-7695-3613-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Xun Dong, John A. Clark, Jeremy L. Jacob |
Threat Modelling in User Performed Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 49-64, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Ben Adida |
Beamauth: two-factor web authentication with a bookmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 48-57, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
phishing, web security, two-factor authentication |
23 | Gianluigi Ferrari 0002, Roberto Guanciale, Daniele Strollo, Emilio Tuosto |
Coordination Via Types in an Event-Based Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Networked and Distributed Systems - FORTE 2007, 27th IFIP WG 6.1 International Conference, Tallinn, Estonia, June 27-29, 2007, Proceedings, pp. 66-80, 2007, Springer, 978-3-540-73195-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #107 of 107 (100 per page; Change: ) Pages: [ <<][ 1][ 2] |
|