|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5224 occurrences of 2354 keywords
|
|
|
Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li |
Identity-Based Key-Insulated Signature with Secure Key-Updates. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure |
28 | Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
XML signature standard, verifiable random function, security, privacy, WS-security, federated identity management |
28 | Craig Gentry |
Practical Identity-Based Encryption Without Random Oracles. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Identity Based Encryption |
28 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure |
28 | Sanjit Chatterjee, Palash Sarkar 0001 |
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Multi-receiver encryption, bilinear pairing, identity based encryption |
28 | Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto |
Universally Composable Identity-Based Encryption. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
IND-ID-CCA2, universal composition, identity-based encryption |
28 | Fan Zhang, Dengguo Feng |
Identity-based PKI Scheme for Machine Readable Travel Document. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
MRTD, PKD, DSI, DSPK, PKI, Identity-based signature |
28 | Marco Casassa Mont, Robert Thyne |
Privacy policy enforcement in enterprises with identity management solutions. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy, access control, identity management, policy enforcement |
28 | Maaria Nuutinen |
Expert Identity construct in analysing prerequisites for expertise development: a case study of nuclear power plant operators' on-the-job training. |
Cogn. Technol. Work. |
2005 |
DBLP DOI BibTeX RDF |
Expert Identity, Emotions, Process control, Nuclear power plant, Work analysis, On-the-job training |
28 | Martin Gaedke, Johannes Meinecke, Martin Nussbaumer |
A modeling approach to federated identity and access management. |
WWW (Special interest tracks and posters) |
2005 |
DBLP DOI BibTeX RDF |
identity and access management, security, reuse, federation |
28 | Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 |
An Identity-Based Model for Grid Security Infrastructure. |
ISSADS |
2005 |
DBLP DOI BibTeX RDF |
Identity Cryptography, Grid Security Infrastructure, Secure Group Communication |
28 | Dan Boneh, Jonathan Katz |
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Public-key encryption, Identity-based encryption, Chosen-ciphertext security |
28 | Zeev Dvir, Amir Shpilka |
Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits. |
STOC |
2005 |
DBLP DOI BibTeX RDF |
depth 3 circuits, locally decodable codes, polynomial identity testing |
28 | Sherman S. M. Chow, Willy Susilo |
Generic Construction of (Identity-Based) Perfect Concurrent Signatures. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Perfect Ambiguity, Bilinear Pairing, Fair-Exchange, Ring Signatures, Identity-based Signatures, Concurrent Signatures |
28 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Threshold Ring Signature. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature |
28 | Swee-Huay Heng, Kaoru Kurosawa |
k-Resilient Identity-Based Encryption in the Standard Model. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption |
28 | Valentine Kabanets, Russell Impagliazzo |
Derandomizing polynomial identity tests means proving circuit lower bounds. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
BPP, NEXP, circuit lower bounds, derandomization, polynomial identity testing |
28 | Lauge Baungaard Rasmussen |
Identity Building in Organisations: Proactive Capability Development. |
AI Soc. |
2002 |
DBLP DOI BibTeX RDF |
Identity building, Proactive capabilities, Routine reflection, Scenario method, Creativity, Organisation, Conflict management |
28 | Rich Ling |
"We Release Them Little by Little": Maturation and Gender Identity as Seen in the Use of Mobile Telephony. |
Pers. Ubiquitous Comput. |
2001 |
DBLP DOI BibTeX RDF |
Youth, Identity, Mobile telephony |
28 | Shahrokh Saeednia, Reihaneh Safavi-Naini |
Efficient Identity-Based Conference Key Distribution Protocols. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Security classes, Identity-based, Conference key |
27 | Matthew Rowe 0001 |
Applying Semantic Social Graphs to Disambiguate Identity References. |
ESWC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Feng Zhu 0010, Wei Zhu |
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments. |
PerCom |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Chuiwei Lu |
Detection and Defense of Identity Attacks in P2P Network. |
ISICA |
2009 |
DBLP DOI BibTeX RDF |
Identify attack, Intrusion detection, Network security, P2P |
27 | Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh |
Identity-based secure protocol scheme for wireless sensor network. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
ID-based authentication, clustering, wireless sensor network, authentication, proxy |
27 | Ming-Hour Yang, Jain-Shing Wu, Shih-Jen Chen |
Protect mobile RFID location privacy using dynamic identity. |
IEEE ICCI |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Milena Yankova, Horacio Saggion, Hamish Cunningham |
Adopting ontologies for multisource identity resolution. |
OBI |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Gang Yao, Hongji Wang, Qingshan Jiang |
An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Shanqing Guo, Chunhua Zhang |
Identity-based Broadcast Encryption Scheme with Untrusted PKG. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Zhi Guan, Huiping Sun, Zhong Chen 0001, Xianghao Nan |
Efficient Identity-Based Key Issue with TPM. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Chenxi Zhang, Rongxing Lu, Xiaodong Lin 0001, Pin-Han Ho, Xuemin Shen |
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Alcides Castro-e-Silva, Gerald Weber, Romuel F. Machado, Elizabeth F. Wanner, Renata Guerra-Sá |
Identity Transposon Networks in D. melanogaster. |
BSB |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Stephen Wilson |
Public key superstructure "it's PKI Jim, but not as we know it!". |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
authentication, PKI, public key infrastructure, digital certificates |
27 | Mandana Vaziri, Frank Tip, Stephen Fink, Julian Dolby |
Declarative Object Identity Using Relation Types. |
ECOOP |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Chaorong Peng, Chang Wen Chen |
A New Network Layer for Mobile Ad Hoc Wireless Networks Based on Assignment Router Identity Protocol. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hoon Wei Lim, Kenneth G. Paterson |
Multi-key Hierarchical Identity-Based Signatures. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Michel Abdalla, Eike Kiltz, Gregory Neven |
Generalized Key Delegation for Hierarchical Identity-Based Encryption. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Rajeev Gupta, Shourya Roy, Manish Bhide |
Identity Delegation in Policy Based Systems. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Rodrigo Lopes, Dongwan Shin |
Controlled sharing of identity attributes for better privacy. |
CollaborateCom |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Vipul Goyal |
Reducing Trust in the PKG in Identity Based Cryptosystems. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sabine Delaître |
Risk Management approach on identity theft in biometric systems context. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Liang Li, Jie Tian 0001, Xin Yang 0001 |
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Clifton Phua, Vincent C. S. Lee, Ross W. Gayler, Kate A. Smith |
Temporal Representation in Spike Detection of Sparse Personal Identity Streams. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Christian Veigner, Chunming Rong |
On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | G. Alan Wang, Hsinchun Chen, Homa Atabakhsh |
A Multi-layer Naïve Bayes Model for Approximate Identity Matching. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
27 | R. J. Hulsebosch, Mortaza S. Bargh, P. H. Fennema, J. F. Zandbelt, Martin Snijders, E. H. Eertink |
Using Identity Management and Secure DNS for Effective and Trusted User Controlled Light-Path Establishment. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Jin Wang, Jia Yu 0005, Daxing Li, Xi Bai 0002, Zhongtian Jia |
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Hoon Wei Lim, Kenneth G. Paterson |
Identity-Based Cryptography for Grid Security. |
e-Science |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Alan N. Martin, Gregory M. P. O'Hare, Brian R. Duffy, Bianca Schön, John F. Bradley |
Maintaining the Identity of Dynamically Embodied Agents. |
IVA |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Rita Sharma, David Poole 0001 |
Probability and Equality: A Probabilistic Model of Identity Uncertainty. |
Canadian AI |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Changgen Peng, Xiang Li |
An Identity-Based Threshold Signcryption Scheme with Semantic Security. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Gail-Joon Ahn, Dongwan Shin, Seng-Phil Hong |
Information Assurance in Federated Identity Management: Experimentations and Issues. |
WISE |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Sarit Mukherjee, Sampath Rangarajan, John Lin, Sanjoy Paul |
User Identity Based Session Redirection in CDMA2000 Networks. |
MobiQuitous |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Dae Hyun Yum, Pil Joong Lee |
Identity-Based Cryptography in Public Key Management. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Willy Susilo, Fangguo Zhang, Yi Mu 0001 |
Identity-Based Strong Designated Verifier Signature Schemes. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Arun Ross, Anil K. Jain 0001 |
Biometrics: When Identity Matters. |
SINOBIOMETRICS |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin |
Identity-Based Zero Knowledge. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Nwe Ni Tun, Satoshi Tojo |
Inheritance of Multiple Identity Conditions in Order-Sorted Logic. |
Australian Conference on Artificial Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
27 | David R. Millen, John F. Patterson |
Identity disclosure and the creation of social capital. |
CHI Extended Abstracts |
2003 |
DBLP DOI BibTeX RDF |
virtual community and community computing, computer mediated communication, social computing and social navigation |
27 | Anantharaman Lakshminarayanan, Jianying Zhou 0001 |
FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. |
DEXA Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Sergio Marti, Hector Garcia-Molina |
Identity Crisis: Anonymity vs. Reputation in P2P Systems. |
Peer-to-Peer Computing |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Matthias Baaz, Christian G. Fermüller |
A Note on the Proof-Theoretic Strength of a Single Application of the Schema of Identity. |
Proof Theory in Computer Science |
2001 |
DBLP DOI BibTeX RDF |
|
27 | S. Ben-Yacoub, Yousri Abdeljaoued, E. Mayoraz |
Fusion of face and speech data for person identity verification. |
IEEE Trans. Neural Networks |
1999 |
DBLP DOI BibTeX RDF |
|
27 | William Aiello, Sachin Lodha, Rafail Ostrovsky |
Fast Digital Identity Revocation (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority |
27 | Frank Eliassen, Randi Karlsen |
Interoperability and Object Identity. |
SIGMOD Rec. |
1991 |
DBLP DOI BibTeX RDF |
|
27 | Gustavus J. Simmons, George B. Purdy |
Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
25 | Sarbari Gupta |
Personal identity verification (PIV) cards as federated identities: challenges and opportunities. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance |
25 | Eve Maler, Drummond Reed |
The Venn of Identity: Options and Issues in Federated Identity Management. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Konstantin Hyppönen |
An Open Mobile Identity Tool: An Architecture for Mobile Identity Management. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ben A. M. Schouten, Massimo Tistarelli, Carmen García-Mateo, Farzin Deravi, Martin Meints |
Nineteen Urgent Research Topics in Biometrics and Identity Management. |
BIOID |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Liang Li, Wei-Qiang Jiang, Jie Tian 0001, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang 0001 |
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Soichi Kozai |
A Mental Space Account for Speaker's Empathy: Japanese Profiling Identity vs. English Shading Identity. |
CONTEXT |
1999 |
DBLP DOI BibTeX RDF |
|
25 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
A generic construction of useful client puzzles. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
identity based KEM, security notions, useful client puzzle |
25 | M. Eric Johnson |
Data Hemorrhages in the Health-Care Sector. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Health-care information, data leaks, security, identity theft |
25 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
25 | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Identity-based encryption, Random-oracle model, Foundations, Searchable encryption |
25 | R. J. Hulsebosch, P. W. G. Ebben |
Enhancing Face Recognition with Location Information. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
authentication, face recognition, Context, sensor fusion, identity verification |
25 | Darren J. Reed, Geraldine Fitzpatrick |
Acting Your Age in Second Life. |
Fun and Games |
2008 |
DBLP DOI BibTeX RDF |
age-identity, performativity, play, Second life, older users |
25 | Zeev Dvir, Amir Shpilka, Amir Yehudayoff |
Hardness-randomness tradeoffs for bounded depth arithmetic circuits. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
bounded depth circuits, hardness-randomness tradeoffs, identity testing, lower bounds, arithmetic circuits |
25 | Ramaswamy Chandramouli |
Policy Specification and Enforcement for Smart ID Cards Deployment. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
XML, Smart Cards, XSLT, Identity Management |
25 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek |
Concurrently-secure credential ownership proofs. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
identity-based cryptography, signature schemes, identification schemes, credential systems, designated-verifier signatures |
25 | Dan Page, Frederik Vercauteren |
A Fault Attack on Pairing-Based Cryptography. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, identity based encryption, fault attack, Tate pairing |
25 | Jaeki Song, Yong Jin Kim |
Social influence process in the acceptance of a virtual community service. |
Inf. Syst. Frontiers |
2006 |
DBLP DOI BibTeX RDF |
Subjective norms, Social comparison, Avatar, Social identity |
25 | Kayvan M. Lavassani, Bahar Movahedi, Vinod Kumar 0001 |
Identification in electronic networks: characteristics of e-identifiers. |
ICEC |
2006 |
DBLP DOI BibTeX RDF |
electronic identification, electronic identifier, electronic networks, e-commerce, identity theft |
25 | Jin Li 0002, Fangguo Zhang, Yanming Wang |
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
Public key encryption, Identity based, Bilinear groups |
25 | He Ge |
An Anonymous Authentication Scheme for Identification Card. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
Anonymous Identification, Privacy, Cryptographic Protocol, Identity Management, Group Signature |
25 | Dickson K. W. Chiu, Changjie Wang, Ho-fung Leung, Irene Kafeza, Eleanna Kafeza |
Supporting the legal identities of contracting agents with an agent authorization platform. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
agent certificate, legal identity, intelligent agents, authorization, PKI, e-contract |
25 | John Sören Pettersson, Simone Fischer-Hübner, Ninni Danielsson, Jenny Nilsson, Mike Bergmann, Sebastian Clauß, Thomas Kriegelstein, Henry Krasemann |
Making PRIME usable. |
SOUPS |
2005 |
DBLP DOI BibTeX RDF |
HCI, identity management, privacy-enhancing technologies |
25 | Zhenfeng Zhang, Dengguo Feng, Jing Xu 0002, Yongbin Zhou |
Efficient ID-Based Optimistic Fair Exchange with Provable Security. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Provable Security, Fair exchange, Identity-based Signature |
25 | Markus Rohde, Leonard Reinecke, Bernd Pape, Monique Janneck |
Community-Building with Web-Based Systems - Investigating a Hybrid Community of Students. |
Comput. Support. Cooperative Work. |
2004 |
DBLP DOI BibTeX RDF |
CommSy, communities of practice (COP), e-community-building, hybrid and self-organized community of students, qualitative interviews, social identity theory (SIT) |
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
25 | Heikki Ailisto, Mikko Lindholm, Satu-Marja Mäkelä, Elena Vildjiounaite |
Unobtrusive user identification with light biometrics. |
NordiCHI |
2004 |
DBLP DOI BibTeX RDF |
body fat percentage, privacy, verification, biometrics, identification, weight, identity theft, height |
25 | Kenji Imamoto, Kouichi Sakurai |
Key-Exchange Protocol Using Pre-agreed Session-ID. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
Diffie-Hellman based key exchange protocol, Identity concealment, Pre-shared key model, Pre-Agreed Session ID |
25 | Dae Hyun Yum, Pil Joong Lee |
Efficient Key Updating Signature Schemes Based on IBS. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
Key insulated signature, intrusion resilient siganture, identity based signature |
24 | Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon |
The User-Centric Vision Matches Credentials Exchanges. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Anis Chaari, Sylvie Lelandais, Mohamed Ben Ahmed |
A Pruning Approach Improving Face Identification Systems. |
AVSS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Lin Chen 0020, Xiaoqin Huang, Jinyuan You |
Certificate-Based Authentication and Authorization Architecture in Digital Library. |
ICADL |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jaewon Shin, Leonidas J. Guibas, Feng Zhao 0001 |
A Distributed Algorithm for Managing Multi-target Identities in Wireless Ad-hoc Sensor Networks. |
IPSN |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Rafael Accorsi |
Automated Privacy Audits to Complement the Notion of Control for Identity Management. |
IDMAN |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Vasu S. Alagar, Kaiyu Wan |
Context Based Enforcement of Authorization for Privacy and Security in Identity Management. |
IDMAN |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Gus Hosein |
Keynote Paper: Politics and Identity Management. |
IDMAN |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 14619 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|