|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 411 occurrences of 203 keywords
|
|
|
Results
Found 597 publication records. Showing 597 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi |
Towards Role Based Trust Management without Distributed Searching of Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 222-237, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Dacheng Zhang, Jie Xu 0007, Xianxian Li |
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings, pp. 440-449, 2007, IEEE Computer Society, 0-7695-2855-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Secure Service Collaborations, Workflow Business Sessions, Web Services, Authentication, Multi-Party Interactions |
22 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
Blacklistable anonymous credentials: blocking misbehaving users without ttps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 72-81, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication |
22 | Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Tappan Morris, M. Frans Kaashoek |
Alpaca: extensible authorization for distributed services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 432-444, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, cryptography, authorization, theorem-proving, logic |
22 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 1-14, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mutative Identity, ID-based Signature |
22 | Zhengyi Le, Yi Ouyang 0001, Yurong Xu, James Ford, Fillia Makedon |
Preventing Unofficial Information Propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 113-125, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart |
Escrow-free encryption supporting cryptographic workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(4), pp. 217-229, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Workflow, Pairings, Identity based encryption |
22 | Jacek Jonczy |
Evaluating Trust and Authenticity with Caution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 449-453, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Isaac Agudo, Javier López 0001, José A. Montenegro |
Attribute Delegation Based on Ontologies and Context Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 54-66, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Walid Bagga, Refik Molva |
Collusion-Free Policy-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 233-245, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Policy, Credentials, Pairing-Based Cryptography |
22 | Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
User centricity: a taxonomy and open issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 1-10, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, taxonomy, delegation, user centric, user control, identity management systems |
22 | Hua Wang 0002, Xiaodi Huang, Goutham Reddy Dodda |
Ticket-based mobile commerce system and its implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'06 - Proceedings of the Second ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Terromolinos, Spain, October 2, 2006, pp. 119-122, 2006, ACM, 1-59593-486-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
signature, SMS, mobile commerce |
22 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Point-Based Trust: Define How Much Privacy Is Worth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 190-209, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
private multi-party computation, Trust management, knapsack problem |
22 | Zhengping Wu, Alfred C. Weaver |
Dynamic Trust Establishment with Privacy Protection for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2005 IEEE International Conference on Web Services (ICWS 2005), 11-15 July 2005, Orlando, FL, USA, pp. 811-812, 2005, IEEE Computer Society, 0-7695-2409-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Yanjiang Yang, Beng Chin Ooi |
A Privacy Preserving Rental System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 59-73, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Weifeng Chen 0001, L. Clarke, James F. Kurose, Donald F. Towsley |
Optimizing cost-sensitive trust-negotiation protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 1431-1442, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Deposit-Case Attack Against Secure Roaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 417-428, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Fan Hong, Xian Zhu, Shaobin Wang |
Delegation Depth Control in Trust-Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 411-414, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Hua Wang 0002, Yanchun Zhang, Jinli Cao, Yahiko Kambayashi |
A Global Ticket-Based Access Scheme for Mobile Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 6(1), pp. 35-46, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
e-commerce, signature, mobile service, ticket |
22 | Moritz Y. Becker, Peter Sewell |
Cassandra: Flexible Trust Management, Applied to Electronic Health Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 139-154, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Junqi Zhang, Vijay Varadharajan, Yi Mu 0001 |
Securing XML Document Sources and Their Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 562-567, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XML contents, Author-X, encryption, key distribution |
22 | Hui Liu, Minglu Li 0001 |
SVO Logic Based Formalisms of GSI Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 744-747, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Russell Impagliazzo, Sara Miner More |
Anonymous credentials with biometrically-enforced non-transferability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 60-71, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
non-transferability, subliminal-freeness, biometrics, revocation, anonymous credentials |
22 | Marco Casassa Mont, Richard Brown 0001 |
Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfraSec ![In: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings, pp. 59-72, 2002, Springer, 3-540-44309-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Jan Camenisch, Anna Lysyanskaya |
A Signature Scheme with Efficient Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 268-289, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Amir Herzberg, Yosi Mass |
Relying Party Credentials Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 328-343, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | David Chaum, Jan-Hendrik Evertse |
A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 118-167, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
19 | Ding Hong, Zhao Yizhu |
A Historical Role-Based Fast Negotiation Model in Open Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 289-293, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
HRFN, history role, historical information record, credential disclosure sequence |
19 | Jianxin Li 0002, Bo Li 0005, Linlin Meng, Dazhi Sun |
HiTrust: A Hybrid Tree Based Trust Negotiation Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, Perth, Australia, 20-13 April 2010, pp. 854-859, 2010, IEEE Computer Society, 978-0-7695-4019-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
access control, security policy, trust management, privacy protection, credential |
19 | Melissa Chase, Sherman S. M. Chow |
Improving privacy and security in multi-authority attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 121-130, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-authority, removing trusted party, privacy, attribute based encryption, anonymous credential |
19 | Prasit Bikash Chanda, Vincent Naessens, Bart De Decker |
Anonymous, Yet Trustworthy Auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings, pp. 225-239, 2009, Springer, 978-3-642-04279-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Distributed Systems, Trust, Anonymity, Auction, Credential |
19 | Dongwan Shin, Rodrigo Lopes, William R. Claycomb |
Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 504-509, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Credential, Federated Identity, Authenticated Dictionary |
19 | Suriadi Suriadi, Ernest Foo, Jason Smith 0001 |
Conditional Privacy Using Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 18-25, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
private credential, privacy, re-encryption |
19 | Jan Camenisch, Thomas Groß 0001, Thomas S. Heydt-Benjamin |
Rethinking accountable privacy supporting services: extended abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 1-8, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
time capsule, privacy, cryptographic protocols, accountability, verifiable encryption, anonymous credential systems |
19 | Shouhuai Xu, Moti Yung |
K-Anonymous Multi-party Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 72-87, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, multiple personality prevention, anonymity, unlinkability, secret handshake, credential systems |
19 | Tyler Moore 0001, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson |
New Strategies for Revocation in Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 232-246, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
credential revocation, sensor networks, key management |
19 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
New Construction of Group Secret Handshakes Based on Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 16-30, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pairings, random oracle, Secret Handshake, Credential System |
19 | Urs Hengartner, Peter Steenkiste |
Access control to people location information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(4), pp. 424-456, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
credential discovery, privacy, trust, RSA, location, Certificates, delegation, DSA, SPKI/SDSI |
19 | Gene Tsudik, Shouhuai Xu |
Brief announcement: a flexible framework for secret handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 39, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
small secret handshakes, unobservability, anonymity, key management, privacy-preservation, credential systems |
19 | Alapan Arnab, Andrew Hutchison |
Fairer usage contracts for DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005, pp. 1-7, 2005, ACM, 1-59593-230-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ODRL, persistent access control, negotiation, DRM, copyright, credential, REL, fair use, rights expression languages |
19 | Mike Just |
Designing and Evaluating Challenge-Question Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(5), pp. 32-39, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Challenge questions, credential recovery, password recovery, user authentication |
19 | Ernest F. Brickell, Jan Camenisch, Liqun Chen 0002 |
Direct anonymous attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 132-145, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
integrity based computing, privacy, cryptographic protocols, trusted computing, anonymous credential systems |
19 | Lynn J. McKell, John H. Reynolds, Herbert E. Longenecker Jr., Jeffrey P. Landry, John Harold Pardue |
Integrating program evaluation and a new certification for information technology professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004, pp. 283, 2004, ACM, 1-58113-936-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
model curriculum, education, certification, credential, program evaluation |
19 | Hristo Koshutanski, Fabio Massacci |
An Interactive Trust Management and Negotiation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 115-128, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Interactive Trust Management, Interactive Access Control, Credential-Based Systems, Logics for Access Control, Trust Management, Internet Computing, Trust Negotiation |
19 | Rie Shigetomi, Akira Otsuka, Hideki Imai |
Anonymous authentication scheme for XML security standard with Refreshable Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 86-93, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XML, anonymity, information security, privacy protection, credential system |
18 | Yang Liu, Debiao He, Min Luo 0002, Huaqun Wang, Qin Liu 0003 |
ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 73(2), pp. 2482-2494, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Weiqing Li, Chinaza Solomon Ironsi |
Efficacy of micro credential learning spaces in developing students' twenty-first century skills: Towards graduate work readiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Educ. Inf. Technol. ![In: Educ. Inf. Technol. 29(1), pp. 1201-1216, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Huifeng Jiao, Nathapon Udomlertsakul, Anukul Tamprasirt |
Credential Control Balance: A Universal Blockchain Account Model Abstract From Bank to Bitcoin, Ethereum External Owned Account and Account Abstraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.10616, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Meng Jia, Jing Chen 0003, Kun He 0008, Min Shi, Yuanzheng Wang, Ruiying Du |
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 2549-2564, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu 0002, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma 0001 |
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 722-734, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yaqing Song, Chunxiang Xu, Yuan Zhang 0006, Shiyu Li |
Hardening Password-Based Credential Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 469-484, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Hemangi Goswami, Hiten Choudhury |
An eSIM-based remote credential provisioning and authentication protocol for IoT devices in 5G cellular network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 23, pp. 100876, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Peng Li, Junzuo Lai, Ye Yang, Meng Sun, Chi Wu, Wei Wu, Xiaowei Yuan |
Attribute-based anonymous credential: Delegation, traceability, and revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 237, pp. 110086, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Aysha Alnuaimi, Diana Hawashin, Raja Jayaraman, Khaled Salah 0001, Mohammed A. Omar |
Trustworthy Healthcare Professional Credential Verification Using Blockchain Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 109669-109688, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ziwang Wang, Liang Wang, Huili Yan |
MA-TEECM: Mutual Anonymous Authentication-Based Credential Migration Technology for Mobile Trusted Execution Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 3680-3690, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jung Yeon Hwang |
Dynamic Anonymous Credential Systems With Controllable Anonymity and Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 142015-142029, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ivan Palamà, Alessandro Amici, Gabriele Bellicini, Francesco Gringoli, Fabio Pedretti, Giuseppe Bianchi 0001 |
Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 212, pp. 129-140, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Nida Nadeem, Muhammad Faisal Hayat, Muhammad Ali Qureshi, Mamoona Majid, Mehwish Nadeem, Jamshaid Iqbal Janjua |
Hybrid Blockchain-based Academic Credential Verification System (B-ACVS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(28), pp. 43991-44019, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Giovanni Bartolomeo |
A Zero-Knowledge Revocable Credential Verification Protocol Using Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.06797, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Amin Mahnamfar, Kemal Bicakci, Yusuf Uzunay |
ROSTAM: A Passwordless Web Single Sign-on Solution Mitigating Server Breaches and Integrating Credential Manager and Federated Identity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.05222, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Vivek Nair, Dawn Song |
Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.08169, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rahma Mukta, Rue C. Teh, Hye-young Paik, Qinghua Lu 0001, Salil S. Kanhere |
VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.01539, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sai Sandilya Konduru, Sweta Mishra |
Detection of Password Reuse and Credential Stuffing: A Server-side Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 989, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Sietse Ringers |
Using the RSA or RSA-B accumulator in anonymous credential schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 11, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos |
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1848, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Olivier Sanders, Jacques Traoré |
Efficient Issuer-Hiding Authentication, Application to Anonymous Credential. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1845, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner |
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 602, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Groß 0001 |
A Relational Credential System from q-SDH-based Graph Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1181, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Sarah Otto, Michael Meisel |
X out of N Credential Requests using Presentation Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023, 2023, Gesellschaft für Informatik e.V., 978-3-88579-729-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ricardo Bochnia, Daniel Richter, Jürgen Anke |
Lifting the Veil of Credential Usage in Organizations: A Taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023, 2023, Gesellschaft für Informatik e.V., 978-3-88579-729-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jozef Drga, Ivan Homoliak, Juraj Vanco, Athanasios Vasilakos, Martin Peresíni, Petr Hanácek |
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBC ![In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2023, Dubai, United Arab Emirates, May 1-5, 2023, pp. 1-4, 2023, IEEE, 979-8-3503-1019-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daria Schumm, Rahma Mukta, Hye-young Paik |
Efficient Credential Revocation Using Cryptographic Accumulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBC ![In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2023, Dubai, United Arab Emirates, May 1-5, 2023, pp. 1-3, 2023, IEEE, 979-8-3503-1019-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ankit Gangwal, Shubham Singh, Abhijeet Srivastava |
AutoSpill: Credential Leakage from Mobile Password Managers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023., pp. 39-47, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Michael K. Reiter |
Tackling Credential Abuse Together. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023., pp. 1, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Olivier Blazy, Céline Chevalier, Guillaume Renaut, Thomas Ricosset, Éric Sageloli, Hugo Senet |
Efficient Implementation of a Post-Quantum Anonymous Credential Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, pp. 24:1-24:11, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Richter, Christopher Robin Praas, Jürgen Anke |
Beyond Paper and Plastic: A Meta-Model for Credential Use and Governance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: 31st European Conference on Information Systems - Co-creating Sustainable Digital Futures, ECIS 2023, Kristiansan, Norway, June 11-16, 2023, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Rika Ikeda, Andrey Ferriyan, Keiko Okawa, Achmad Husni Thamrin |
Enhancing Learning Mobility with a Community-Based Micro-Credential e-Portfolio Platform Service for Higher Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-TEL ![In: Responsive and Sustainable Educational Futures - 18th European Conference on Technology Enhanced Learning, EC-TEL 2023, Aveiro, Portugal, September 4-8, 2023, Proceedings, pp. 566-572, 2023, Springer, 978-3-031-42681-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Vivek Nair, Dawn Song |
Multi-Factor Credential Hashing for Asymmetric Brute-Force Attack Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023, pp. 56-72, 2023, IEEE, 978-1-6654-6512-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rahma Mukta, Rue C. Teh, Hye-Young Paik, Qinghua Lu 0001, Salil S. Kanhere |
VCTP: A Verifiable Credential-Based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAPPS ![In: IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2023, Athens, Greece, July 17-20, 2023, pp. 109-118, 2023, IEEE, 979-8-3503-3535-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daria Schumm, Rahma Mukta, Hye-young Paik |
Efficient Credential Revocation Using Cryptographic Accumulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAPPS ![In: IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2023, Athens, Greece, July 17-20, 2023, pp. 127-134, 2023, IEEE, 979-8-3503-3535-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Dariusz Dudek |
Blockchain in OER: students' perspectives on the use of blockchain technology for credential authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, Athens, Greece, 6-8 September 2023., pp. 4648-4656, 2023, Elsevier. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mais Kayyali, Claudia Calle Müller, Morgan H. McKie, Maimuna Begum Kali, Alexandra Coso Strong, Mohamed ElZomor |
Micro-Credential Digital Badges in Engineering and Computing at an MSI: The Student's Perspective (Work in Progress). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIE ![In: IEEE Frontiers in Education Conference, FIE 2023, College Station, TX, USA, October 18-21, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-3642-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, Sascha Fahl |
"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, pp. 171-190, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner |
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 773-789, 2023, IEEE, 978-1-6654-9336-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Adian Shubbar, Andreas Walz, Julian Göppert, Axel Sikora |
A NETCONF-Based Solution for Credential Management in Time-Sensitive Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: 28th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2023, Sinaia, Romania, September 12-15, 2023, pp. 1-8, 2023, IEEE, 979-8-3503-3991-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alexander Mühle, Katja Assaf, Daniel Köhler, Christoph Meinel |
Requirements of a Digital Education Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDUCON ![In: IEEE Global Engineering Education Conference, EDUCON 2023, Kuwait, May 1-4, 2023, pp. 1-10, 2023, IEEE, 979-8-3503-9943-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Nasima Begum, Toru Nakanishi 0001 |
An Efficient Revocable Delegatable Anonymous Credential System Using an Accumulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 30, pp. 706-717, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Mohamed A. El-Zawawy, Alessandro Brighente, Mauro Conti |
SETCAP: Service-Based Energy-Efficient Temporal Credential Authentication Protocol for Internet of Drones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 206, pp. 108804, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Bosk, Davide Frey, Mathieu Gestin, Guillaume Piolle |
Hidden Issuer Anonymous Credential. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2022(4), pp. 571-607, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Dongxiao Liu, Huaqing Wu, Jianbing Ni, Xuemin Shen |
Efficient and Anonymous Authentication With Succinct Multi-Subscription Credential in SAGVN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 23(3), pp. 2863-2873, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Eranga Bandara, Sachin Shetty, Ravi Mukkamala, Xueping Liang, Peter Foytik, Nalin Ranasinghe, Kasun De Zoysa |
Casper: a blockchain-based system for efficient and secure customer credential verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Bank. Financial Technol. ![In: J. Bank. Financial Technol. 6(1), pp. 43-62, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Dongxiao Liu, Huaqing Wu, Cheng Huang 0001, Jianbing Ni, Xuemin Shen |
Blockchain-Based Credential Management for Anonymous Authentication in SAGVN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 40(10), pp. 3104-3116, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jonathan Heiss, Robert Muth, Frank Pallas, Stefan Tai |
Non-Disclosing Credential On-chaining for Blockchain-based Decentralized Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.09584, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jozef Drga, Ivan Homoliak, Juraj Vanco, Martin Peresíni, Petr Hanácek |
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.03490, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Hamza Baniata, Attila Kertész |
PriFoB: A Privacy-aware Fog-enhanced Blockchain-based system for Global Accreditation and Credential Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 205, pp. 103440, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Rohini Poolat Parameswarath, Prosanta Gope, Biplab Sikdar 0001 |
User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Manag. Inf. Syst. ![In: ACM Trans. Manag. Inf. Syst. 13(4), pp. 44:1-44:21, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Samuel Jaques, Michael Lodder, Hart Montgomery |
ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1362, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Aisling Connolly, Jérôme Deschamps, Pascal Lafourcade 0001, Octavio Perez-Kempner |
Protego: A Credential Scheme for Permissioned Blockchains (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 661, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Alfredo Rial, Ania M. Piotrowska |
Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 11, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Simone Dutto, Davide Margaria, Carlo Sanna, Andrea Vesco |
Toward a Post-Quantum Zero-Knowledge Verifiable Credential System for Self-Sovereign Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1297, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
Displaying result #101 - #200 of 597 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|