The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for identity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1947-1973 (17) 1974-1977 (20) 1978-1980 (15) 1981-1983 (20) 1984 (15) 1985-1986 (19) 1987-1988 (39) 1989 (37) 1990 (37) 1991 (30) 1992 (26) 1993 (32) 1994 (38) 1995 (37) 1996 (43) 1997 (55) 1998 (54) 1999 (93) 2000 (101) 2001 (143) 2002 (186) 2003 (279) 2004 (395) 2005 (600) 2006 (691) 2007 (806) 2008 (793) 2009 (794) 2010 (499) 2011 (572) 2012 (458) 2013 (516) 2014 (559) 2015 (520) 2016 (528) 2017 (595) 2018 (623) 2019 (767) 2020 (808) 2021 (868) 2022 (794) 2023 (888) 2024 (209)
Publication types (Num. hits)
article(6043) book(16) data(4) incollection(190) inproceedings(8179) phdthesis(130) proceedings(57)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5224 occurrences of 2354 keywords

Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
39Kalman C. Toth, Ann Cavoukian, Alan Anderson-Priddy Privacy by Design Architecture Composed of Identity Agents Decentralizing Control over Digital Identity. Search on Bibsonomy Open Identity Summit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
39Michael Kubach, Christian H. Schunck, Rachelle Sellung, Heiko Roßnagel Self-sovereign and Decentralized identity as the future of identity management? Search on Bibsonomy Open Identity Summit The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
39Costantina Caruso, Andrea Dimitri, Massimo Mecella Identity Mining vs Identity Discovering: a new approach. Search on Bibsonomy Open Identity Summit The full citation details ... 2016 DBLP  BibTeX  RDF
39Sebastian Kurowski Economic issues of federated identity management - an estimation of the costs of identity lifecycle management in inter-organisational information exchange using transaction cost theory. Search on Bibsonomy Open Identity Summit The full citation details ... 2015 DBLP  BibTeX  RDF
39Sanjit Chatterjee, Palash Sarkar 0001 Identity-Based Encryption and Hierarchical Identity-Based Encryption. Search on Bibsonomy Identity-Based Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39Thierry Nabeth Identity of Identity. Search on Bibsonomy The Future of Identity in the Information Society The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Makoto Hatakeyama, Shigeyoshi Shima Privilege federation between different user profiles for service federation. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privilege management, access control, identity federation
38Stefan Berthold, Sebastian Clauß Linkability estimation between subjects and message contents using formal concepts. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymity, data analysis, information management, identity management, privacy-enhancing technology, concept analysis, unlinkability
38Sebastian Clauß, Stefan Schiffner Structuring anonymity metrics. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anonymity metrics, privacy metrics, identity management
38António Lacerda The signs and the corporate identity in contemporary society. Search on Bibsonomy SIGDOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF corporate identity, organizational identity, communication design
38Gideon Ranga, Stephen Flowerday Identity and access management for the distribution of social grants in South Africa. Search on Bibsonomy SAICSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF federated and isolated identity management architectures, identity and access management, authentication, authorisation
38Wenjie Wang, Yufei Yuan, Norman P. Archer A Contextual Framework for Combating Identity Theft. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF identity authentication, risk analysis, security and privacy, Identity theft, multi-party interaction
38Alapan Arnab, Andrew Hutchison Verifiable digital object identity system. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data identity, handle system, vdoi, digital signatures, identifier, identity verification
38Uwe Jendricke, Daniela Gerd tom Markotten Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security mechanism usability, protection goals, personal security assistant, security functions configuration, security functionality, user identity selection, inexperienced users, security needs negotiation, Internet, user interfaces, user interface, human factors, Identity-Manager, personal computing, Internet applications, authorisation, telecommunication security
38Matthew Rowe 0001 The credibility of digital identity information on the social web: a user study. Search on Bibsonomy WICOW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social web, digital identity, information credibility
38Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J. Mitchell CardSpace-liberty integration for CardSpace users. Search on Bibsonomy IDtrust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Liberty Alliance project, browser extension, interoperability, identity management, SAML, CardSpace
38Ning Shang, Federica Paci, Elisa Bertino Efficient and privacy-preserving enforcement of attribute-based access control. Search on Bibsonomy IDtrust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Agg-EQ-OCBE, privacy, identity
38Susan Landau 0001, Hubert Lê Van Gông, Robin Wilton Achieving Privacy in a Federated Identity Management System. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, policy, law, federated identity management
38Bob Hulsebosch, Robert de Groote, Martin Snijders Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF lightpath provisioning, trust, identity management, federation, User centric, network resources
38D. Fox Harrell Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming. Search on Bibsonomy Creativity & Cognition The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cognitive categorization, social classification, stigma, social networking, gaming, empowerment, social identity
38David Galindo, Flavio D. Garcia A Schnorr-Like Lightweight Identity-Based Signature Scheme. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Schnorr, provable security, random oracle model, identity-based signature, lightweight cryptography
38Giovanni Di Crescenzo On the Statistical Dependency of Identity Theft on Demographics. Search on Bibsonomy ISIPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF US Demographics, Statistics, Regression Analysis, Identity Theft
38Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, Kevin J. Steuer A Federated Digital Identity Management Approach for Business Processes. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF naming heterogeneity, interoperability, business process, identity management
38Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Undeniable Signatures, Identity-based, Convertible
38Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino Privacy Requirements in Identity Management Solutions. Search on Bibsonomy HCI (9) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Social and Legal Concerns, Security, Privacy, Identity Management
38Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure
38G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Chunju Tseng, Homa Atabakhsh, Hsinchun Chen The Arizona IDMatcher: developing an identity matching tool for law enforcement. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF identity matching, probabilistic algorithm, entity matching
38Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson What can identity-based cryptography offer to web services? Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message-level security, web services, identity-based cryptography
38G. Alan Wang, Hsinchun Chen, Homa Atabakhsh A probabilistic model for approximate identity matching. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF identity matching, naïve bayes model, semi-supervised learning
38Kim Luong The other side of identity theft: not just a financial concern. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security, identity theft
38E. Axel Larsson A case study: implementing novell identity management at Drew University. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF DirXML, eDirectory, identity management, single sign on, directory services, active directory, novell, password management
38Joon S. Park, Harish S. Krishnan Trusted Identity and Session Management Using Secure Cookies. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF .NET Passport, Identity Management, Cookies
38Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 An Identity-Based Grid Security Infrastructure Model. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Identity Cryptography, Public Key Infrastructure, Security Group Communication
38Zhenfeng Zhang, Jing Xu 0002, Dengguo Feng Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security protocol, Fair exchange, Identity-based signature, Certified E-mail
38Gerhard Jakisch E-Signature versus E-Identity the Creation of the Digital Citizen. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF e-Signature, e-Identity, digital citizen, e-address, email address, technical solution, administrative requirements, administrative processes, advanced electronic signature, e-commerce, e-Government, government data processing, holistic approach, public authorities
38Gus Lopez, Bjørn N. Freeman-Benson, Alan Borning Constraints and Object Identity. Search on Bibsonomy ECOOP The full citation details ... 1994 DBLP  DOI  BibTeX  RDF constraint imperative programming, Kaleidoscope, constraints, aliasing, object identity
37Jiexun Li, G. Alan Wang, Hsinchun Chen PRM-based identity matching using social context. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Ludwig Fuchs, Günther Pernul Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Wei Wu 0001, Yi Mu 0001, Willy Susilo, Jennifer Seberry, Xinyi Huang 0001 Identity-Based Proxy Signature from Pairings. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Cheng-Kang Chu, Wen-Guey Tzeng Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymous signatures, group signatures, ring signatures
37Rodger Jamieson, Donald Winchester, Stephen Smith 0001 Development of a Conceptual Framework for Managing Identity Fraud. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen The Arizona IDMatcher: A Probabilistic Identity Matching System. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Jörn Altmann, Rajarajan Sampath UNIQuE: A User-Centric Framework for Network Identity Management. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Joonsang Baek, Yuliang Zheng 0001 Identity-Based Threshold Decryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Dan Boneh, Xavier Boyen Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Oliver Berthold, Marit Köhntopp Identity Management Based on P3P. Search on Bibsonomy Workshop on Design Issues in Anonymity and Unobservability The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Piotr Pacyna, Anthony M. Rutkowski, Amardeo Sarma, Kenji Takahashi Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Digital identity, Security & privacy, Identity management systems
36Antonio Fernandez Gómez-Skarmeta, Pedro Martinez-Julia, Joao Girão, Amardeo Sarma Identity based architecture for secure communication in future internet. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Massimo Tistarelli, Enrico Grosso Identity Management in Face Recognition Systems. Search on Bibsonomy BIOID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF pattern recognition, computer vision, face recognition, biometrics, identity management
35Craig Gentry, Alice Silverberg Hierarchical ID-Based Cryptography. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF hierarchical identity-based cryptography, elliptic curves, identity-based cryptography, pairing-based cryptography
35Liang Yan, Chunming Rong, Gansen Zhao Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Marc Barisch, Alfredo Matos Integrating user Identity Management systems with the Host Identity Protocol. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Corinne S. Irwin, Dennis C. Taylor Identity, credential, and access management at NASA, from Zachman to attributes. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS)
35Simon J. D. Prince, Jania Aghajanian, Umar Mohammed, Maneesh Sahani Latent Identity Variables: Biometric Matching Without Explicit Identity Estimation. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Face Recognition, Biometrics, Bayesian Methods
35Zhaohui Cheng, Liqun Chen 0002, Richard Comley, Qiang Tang 0001 Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Sebastian Gajek, Jörg Schwenk, Michael Steiner 0001, Chen Xuan Risks of the CardSpace Protocol. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF analysis, identity management, CardSpace
35Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes
34G. Alan Wang, Jennifer Jie Xu 0001, Hsinchun Chen Using Social Contextual Information to Match Criminal Identities. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Takumi Akahoshi, Manabu Okamoto, Michio Shimomura, Naohisa Komatsu Improving the safety and practicality of authorization technology using LOAF. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, access control, identity management, openid
34Brendan Francis O'Connor, John Linwood Griffin Mnikr: reputation construction through human trading of distributed social identities. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF digital persona, social networking, reputation, identity, stock market
34Phillip J. Windley, Devlin Daley, Bryant Cutler, Kevin Tew Using reputation to augment explicit authorization. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF framework, blogging, reputation, identity
34Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bertino Receipt management- transaction history based trust establishment. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, privacy, authentication, identity
33Frank Schell, Jochen Dinger, Hannes Hartenstein Performance Evaluation of Identity and Access Management Systems in Federated Environments. Search on Bibsonomy Infoscale The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity and access management, scalability, access control, federated identity management
33Markus Bylund, Kristina Höök, Alina Pommeranz Pieces of identity. Search on Bibsonomy NordiCHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, cultural probes, digital identity, social identity
33Aleksej Jerman Blazic, Kajetan Dolinar, Jan Porekar Enabling Privacy in Pervasive Computing Using Fusion of Privacy Negotiation, Identity Management and Trust Management Techniques. Search on Bibsonomy ICDS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Policy negotiation, Privacy, Trust management, Identity management, Pervasive systems, Personal information, Virtual identity
33Katrin Borcea-Pfitzmann, Elke Franz 0001, Andreas Pfitzmann Usable presentation of secure pseudonyms. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (un)linkability, digital pseudonyms, privacy, usability, names, mnemonics
33Yu Chen 0003, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen 0001 Identity-based encryption based on DHIES. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF DHIES, combination, identity-based encryption, bilinear map
33Mads Schaarup Andersen Architectural mismatch issues in identity management deployment. Search on Bibsonomy ECSA Companion Volume The full citation details ... 2010 DBLP  DOI  BibTeX  RDF architectural mismatch, architectural prototyping, COTS, identity management, provisioning
33Lein Harn, Jian Ren 0001, Changlu Lin Efficient identity-based GQ multisignatures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ISO/IEC standard, Public-key cryptography, Identity-based signature, Multisignature
33Tossapon Boongoen, Qiang Shen 0001 Intelligent hybrid approach to false identity detection. Search on Bibsonomy ICAIL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF false identity detection, terrorist data, link analysis, hybrid algorithm
33John Dunagan, Alice X. Zheng, Daniel R. Simon Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs. Search on Bibsonomy SOSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity snowball, machine learning, support vector machine, authentication, access control, combinatorial optimization, attack graph, sparsest cut
33Carman Neustaedter, Elena A. Fedorovskaya Presenting identity in a virtual world through avatar appearances. Search on Bibsonomy Graphics Interface The full citation details ... 2009 DBLP  BibTeX  RDF virtual worlds, avatar, identity, appearance
33David Oyarzun, Amalia Ortiz, Maria del Puy Carretero, Alex García-Alonso Creating the Goodies and Baddies of the Story: Specification of an Interoperable and Reusable Avatar Identity. Search on Bibsonomy ICIDS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF standardization, Virtual characters, virtual identity
33David W. Chadwick FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information cards, authorisation, federated identity management, X.509 certificates, CardSpace
33Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon 0001, Nikhil Swamy Verified implementations of the information card federated identity-management protocol. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptographic protocol verification, verified implementations, web services security, federated identity management, CardSpace
33Mari W. Buche Influence of gender on IT professional work identity: outcomes from a PLS study. Search on Bibsonomy CPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intent to leave, work identity, theory, IT workforce, job satisfaction, gender issues, IT profession
33Ivonne Thomas, Michael Menzel 0001, Christoph Meinel Using quantified trust levels to describe authentication requirements in federated identity management. Search on Bibsonomy SWS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication and access control, trust levels, web service federation, trust management, federated identity management
33Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu Identity-Based Threshold Key-Insulated Encryption without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold key-insulation, standard model, identity-based encryption, key-exposure
33Zohar Shay Karnin, Amir Shpilka Black Box Polynomial Identity Testing of Generalized Depth-3 Arithmetic Circuits with Bounded Top Fan-In. Search on Bibsonomy CCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PIT, depth-3, arithmetic circuit, deterministic, polynomial identity testing
33Waleed A. Alrodhan, Chris J. Mitchell A client-side CardSpace-Liberty integration architecture. Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Liberty, integration, identity management, federation, CardSpace
33Xuefeng Wen A Propositional Logic with Relative Identity Connective and a Partial Solution to the Paradox of Analysis. Search on Bibsonomy Stud Logica The full citation details ... 2007 DBLP  DOI  BibTeX  RDF relative identity, paradox of analysis, hyperintensional logic, context
33Fagen Li, Yupu Hu, Chuanrong Zhang An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity-based signcryption, Ad hoc networks, provable security, bilinear pairings
33Katrin Hoeper, Guang Gong Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Identity-Based Schemes, Key Renewal, Neighborhood Monitoring, Mobile Ad Hoc Networks, Revocation
33Frederic Stutzman, Terrell Russell ClaimID: a system for personal identity management. Search on Bibsonomy JCDL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF personal identity management, folksonomy
33Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang Short (Identity-Based) Strong Designated Verifier Signature Schemes. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF strong designated verifier signature scheme, random oracle model, short signature, identity based, designated verifier signature
33Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF pairings, Signcryption, identity-based cryptography
33Greg Goth Identity Management, Access Specs are Rolling Along. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network identity management, single sign on, access management
33Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu Identity Based Delegation Network. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Delegation network, bilinear pairings, proxy signature, identity-based cryptography, batch verification
33Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption
33Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu 0001, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF identity matching, data mining, social network analysis, law enforcement, homeland security
33Manuel Barbosa, Pooya Farshim Efficient Identity-Based Key Encapsulation to Multiple Parties. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Encapsulation Mechanism (KEM), Provable Security, Identity Based Cryptography, Hybrid Encryption
33Noel McCullagh, Paulo S. L. M. Barreto A New Two-Party Identity-Based Authenticated Key Agreement. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear maps, Tate pairing, identity-based cryptography, authenticated key agreement
33Zhenjie Huang, Kefei Chen, Yumin Wang Efficient Identity-Based Signatures and Blind Signatures. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Gap Diffie-Hellman group, Signature, Bilinear pairings, Blind signature, Identity-based
33Joonsang Baek, Yuliang Zheng 0001 Identity-Based Threshold Signature Scheme from the Bilinear Pairings. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Identity-based threshold signature, Generalized Bilinear Problem, Bilinear Pairing, Verifiable secret-sharing, Chosen message attack
33Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow Secure Hierarchical Identity Based Signature and Its Application. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Hierarchical identity-based signature, forward-secure signature, bilinear pairings
33Florian Hess Efficient Identity Based Signature Schemes Based on Pairings. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Tate pairing, key escrow, Identity based signatures, Weil pairing
33K. C. Reddy, Divya Nalla Identity Based Authenticated Group Key Agreement Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing
33Marina Umaschi Bers, Joseph Gonzalez-Heydrich, David Ray DeMaso Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis. Search on Bibsonomy CHI The full citation details ... 2001 DBLP  DOI  BibTeX  RDF dialysis, pediatric patients, storytelling, virtual communities, identity, therapy, multi-user virtual environment
33Sherry M. B. Thatcher The Mediating Role of Identity Fit: Understanding the Relationship between Communication Media, Demographic Differences, and Creativity. Search on Bibsonomy HICSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF identity fit, demographic differences, creativity, communication media
Displaying result #101 - #200 of 14619 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license