Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Xianhui Lu, Bao Li 0001, Qixiang Mei, Haixia Xu 0002 |
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 297-308, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Christopher Kunz, Nina Tahmasebi, Thomas Risse 0001, Matthew Smith 0001 |
Detecting Credential Abuse in the Grid Using Bayesian Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 12th IEEE/ACM International Conference on Grid Computing, GRID 2011, Lyon, France, September 21-23, 2011, pp. 114-120, 2011, IEEE Computer Society, 978-1-4577-1904-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Yevgeniy Vahlis |
Cryptography: Leakage Resilience, Black Box Separations, and Credential-free Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
RDF |
|
18 | Francesco Tusa, Massimo Villari, Antonio Puliafito |
Credential Management Enforcement and Secure Data Storage in gLite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Syst. Technol. ![In: Int. J. Distributed Syst. Technol. 1(1), pp. 76-97, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Yajun Jiang, Bo Yang 0003, Mingwu Zhang |
A Classified Credential Selection Scheme with Disclosure-minimizing Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Content Technol. its Appl. ![In: J. Digit. Content Technol. its Appl. 4(9), pp. 201-211, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
18 | Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 54(1), pp. 225-236, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Jan Camenisch, Nathalie Casati, Thomas Gross 0001, Victor Shoup |
Credential Authenticated Identification and Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 55, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
18 | Sven Bugiel, Jan-Erik Ekberg |
Implementing an application-specific credential platform using late-launched mobile trusted module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC@CCS ![In: Proceedings of the fifth ACM workshop on Scalable trusted computing, STC@CCS 2010, Chicago, IL, USA, October 4, 2010, pp. 21-30, 2010, ACM, 978-1-4503-0095-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
18 | Ali Nasrat Haidar, Stefan J. Zasada, Peter V. Coveney, Ali E. Abdallah, Bruce Beckles |
Audited credential delegation - a user-centric identity management solution for computational grid environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Sixth International Conference on Information Assurance and Security, IAS 2010, Atlanta, GA, USA, August 23-25, 2010, pp. 222-227, 2010, IEEE, 978-1-4244-7407-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Moritz Y. Becker |
Information Flow in Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010, pp. 171-185, 2010, IEEE Computer Society, 978-0-7695-4082-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Lujo Bauer, Limin Jia 0001, Divya Sharma |
Constraining Credential Usage in Logic-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010, pp. 154-168, 2010, IEEE Computer Society, 978-0-7695-4082-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Access control, Logic, Computer security, Formal languages |
18 | Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio |
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1090-1095, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, Access control, XACML, SAML, anonymous credentials |
18 | Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati |
Supporting privacy preferences in credential-based interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010, pp. 83-92, 2010, ACM, 978-1-4503-0096-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Yarema Varetskyy, Bogdan Rusyn, Agnieszka Molga, Anatoliy Ignatovych |
A New Method of Fingerprint Key Protection of Grid Credential. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IP&C ![In: Image Processing and Communications Challenges 2 - 2nd International Conference, IP&C 2010, Proceedings, pp. 99-103, 2010, Springer, 978-3-642-16294-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar K. Iyer, James Barlow |
Analysis of Credential Stealing Attacks in an Open Networked Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 144-151, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Jonathan Hart, Konstantinos Markantonakis, Keith Mayes |
Website Credential Storage and Two-Factor Web Authentication with a Java SIM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings, pp. 229-236, 2010, Springer, 978-3-642-12367-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi |
Hidden Credential Retrieval without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers, pp. 160-174, 2010, Springer, 978-3-642-17954-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati |
Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SocialCom/PASSAT ![In: Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom / IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, Minnesota, USA, August 20-22, 2010, pp. 743-750, 2010, IEEE Computer Society, 978-0-7695-4211-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Kari Kostiainen, N. Asokan, Jan-Erik Ekberg |
Credential Disabling from Trusted Execution Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers, pp. 171-186, 2010, Springer, 978-3-642-27936-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Jorge Guajardo, Bart Mennink, Berry Schoenmakers |
Anonymous Credential Schemes with Encrypted Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 314-333, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Jan Camenisch, Nathalie Casati, Thomas Gross 0001, Victor Shoup |
Credential Authenticated Identification and Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings, pp. 255-276, 2010, Springer, 978-3-642-14622-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Krzysztof Sacha |
Credential Chain Discovery in RTT Trust Management Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings, pp. 195-208, 2010, Springer, 978-3-642-14705-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | |
Credential Hardening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Biometrics ![In: Encyclopedia of Biometrics, pp. 205, 2009, Springer US, 978-0-387-73002-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon |
On Analyzing the Potential of a Layer-2 Multi-hop Authentication and Credential Delivery Scheme for Vehicular Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 51(1), pp. 31-52, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | A. Damodaram, H. Jayasri |
Authentication Without Identification using Anonymous Credential System ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0908.0979, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
18 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 126, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
18 | Nick Bartlow, Bojan Cukic |
Keystroke Dynamics-Based Credential Hardening Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Handbook of Remote Biometrics ![In: Handbook of Remote Biometrics, pp. 329-347, 2009, Springer, 978-1-84882-384-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Xavier Boyen |
Hidden credential retrieval from a reusable password. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 228-238, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
online authentication, partially trusted servers, reusable passwords, stateless roaming credentials |
18 | Moritz Y. Becker, Jason F. Mackay, Blair Dillaway |
Abductive Authorization Credential Gathering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 1-8, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Marcel Henseler, Michael Rossberg, Guenter Schaefer |
Credential Management for Automatic Identification Solutions in Supply Chain Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 4(4), pp. 303-314, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Authenticated Key Exchange Protocol for Credential Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1), pp. 139-149, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Erman Ayday, Faramarz Fekri |
Using node accountability in credential based routing for mobile ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASS ![In: IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, MASS 2008, 29 September - 2 October 2008, Atlanta, Georgia, USA, pp. 503-504, 2008, IEEE Computer Society, 978-1-4244-2574-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Tao Jiang 0004, John S. Baras |
Trust Credential Distribution in Autonomic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pp. 1974-1978, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Christian Tchepnda, Hassnaa Moustafa, Houda Labiod, Gilles Bourdon |
A Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pp. 628-633, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Hristo Koshutanski, Antonio Maña |
A Semantic Approach to Access Control and Automated Credential Negotiation for Decentralized Online Repositories / An OKKAM Project Use Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWAP ![In: Proceedings of the 5th Workshop on Semantic Web Applications and Perspectives (SWAP2008), Rome, Italy, December 15-17, 2008, 2008, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
18 | Mohammad Mannan, Paul C. van Oorschot |
Localization of credential information to address increasingly inevitable data breaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008, pp. 13-21, 2008, ACM, 978-1-60558-341-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Raghav Bhaskar, K. Chandrasekaran 0003, Satyanarayana V. Lokam, Peter L. Montgomery, Ramarathnam Venkatesan, Yacov Yacobi |
Vulnerabilities in Anonymous Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STM@ESORICS ![In: Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007, pp. 141-148, 2007, Elsevier. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Konstantina Stoupa, Athena Vakali |
Clustering subjects in a credential-based access control framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 26(2), pp. 120-129, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Javed I. Khan, Kailas B. Bobade, Manas Hardas |
Intra-federation credential negotiation based on individualized release strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications, Internet, and Information Technology ![In: Proceedings of the Sixth IASTED International Conference on Communications, Internet, and Information Technology, July 2-4, 2007, Banff, Alberta, Canada, pp. 139-144, 2007, IASTED/ACTA Press, 978-0-88986-674-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
18 | Gabriel López Millán, Óscar Cánovas Reverte, Diego R. López, Antonio Fernandez Gómez-Skarmeta |
Extending the Common Services of eduGAIN with a Credential Conversion Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 501-514, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Lanxiang Chen, Dan Feng |
An Efficient Credential-Based Scheme for Cross-Domain File Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007, pp. 614-617, 2007, IEEE Computer Society, 0-7695-3072-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Ajith Kamath, Ramiro Liscano, Abdulmotaleb El-Saddik |
User-credential based role mapping in multi-domain environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 62, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Jim Basney, Marty Humphrey, Von Welch |
The MyProxy online credential repository. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 35(9), pp. 801-816, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Hristo Koshutanski, Fabio Massacci |
Interactive Credential Negotiation for Stateful Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 256-272, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala |
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 252-266, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Jacek Jonczy, Rolf Haenni |
Credential Networks: a General Model for Distributed Trust and Authenticity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
18 | Dale Gustafson, Mike Just, Magnus Nyström |
Securely Available Credentials (SACRED) - Credential Server Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 3760, pp. 1-22, April 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Andreas Pashalidis, Chris J. Mitchell |
A Security Model for Anonymous Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Information Security Workshops ![In: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France, pp. 183-198, 2004, Kluwer, 1-4020-8144-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Stig Fr. Mjølsnes, Chunming Rong |
On-Line E-Wallet System with Decentralized Credential Keepers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 8(1), pp. 87-99, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
18 | Ninghui Li, William H. Winsborough, John C. Mitchell |
Distributed Credential Chain Discovery in Trust Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 11(1), pp. 35-86, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Pierangela Samarati |
Towards Flexible Credential Negotiation Protocols (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 24-27, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati |
Towards Flexible Credential Negotiation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 19-23, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Theodoros Balopoulos, Stefanos Gritzalis |
Towards a Logic of Privacy-Preserving Selective Disclosure Credential Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 396-401, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Jason E. Holt, Kent E. Seamons |
Selective disclosure credential sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 151, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
18 | Joachim Biskup |
Credential-basierte Zugriffskontrolle: Wurzeln und ein Ausblick. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI Jahrestagung ![In: 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30 - October 3, 2002, pp. 423-428, 2002, GI, 3-88579-348-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
18 | Pierangela Samarati |
Enriching Access Control to Support Credential-Based Specificatons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI Jahrestagung ![In: 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30 - October 3, 2002, pp. 431, 2002, GI, 3-88579-348-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
18 | Pierangela Samarati |
Enriching Access Control to Support Credential-Based Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI Jahrestagung ![In: 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30 - October 3, 2002, pp. 114-119, 2002, GI, 3-88579-348-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
18 | Olga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman |
Kerberized Credential Translation: A Solution to Web Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 10th USENIX Security Symposium, August 13-17, 2001, Washington, D.C., USA, 2001, USENIX. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
18 | Jason Novotny, Steven Tuecke, Von Welch |
An Online Credential Repository for the Grid: MyProxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: 10th IEEE International Symposium on High Performance Distributed Computing (HPDC-10 2001), 7-9 August 2001, San Francisco, CA, USA, pp. 104-, 2001, IEEE Computer Society, 0-7695-1296-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Yücel Karabulut |
Credential Management for Secure Mediators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Grundlagen von Datenbanken ![In: 11. Workshop Grundlagen von Datenbanken, GvD 1999, Arbeitskreis `Grundlagen von Informationssystemen` im GI-Fachausschuß 2.5, Luisenthal, 25.-28. Mai 1999., pp. 52-56, 1999, Friedrich-Schiller-Universität Jena. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
18 | Detlef Hühnlein |
Credential Management and Secure Single Login for SPKM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 1998, San Diego, California, USA, 1998, The Internet Society, 1-891562-01-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
18 | Kent E. Seamons, William H. Winsborough, Marianne Winslett |
Internet Credential Acceptance Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPIA-GULP-PRODE ![In: 1997 Joint Conf. on Declarative Programming, APPIA-GULP-PRODE'97, Grado, Italy, June 16-19, 1997, pp. 415-432, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
11 | Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer |
A card requirements language enabling privacy-preserving access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 119-128, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, policy languages, anonymous credentials, digital credentials |
11 | Gregory Neven |
Privacy-enhanced access control in primelife. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
11 | Hristo Koshutanski, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori |
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(4), pp. 291-314, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access control, Authorization, Trust negotiation, Grid security, Behavioral control |
11 | Ke Chen 0005, Kai Hwang 0001, Gang Chen 0001 |
Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 20(1), pp. 83-96, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Emerson Ribeiro de Mello, Michelle S. Wangham, Joni da Silva Fraga, Edson Tavares de Camargo, Davi da Silva Böger |
A Model for Authentication Credentials Translation in Service Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 68-86, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Web Services, Single Sign-on |
11 | Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala |
On-board credentials with open provisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 104-115, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
provisioning protocols, trusted computing, credentials, secure hardware |
11 | Sherman S. M. Chow |
Real Traceable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 92-107, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures |
11 | Virginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck |
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 66-73, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hypergraph, attack graph, vulnerability assessment, network attack |
11 | Janani C. Sriram, Minho Shin, Tanzeem Choudhury, David Kotz |
Activity-aware ECG-based patient authentication for remote health monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMI ![In: Proceedings of the 11th International Conference on Multimodal Interfaces, ICMI 2009, Cambridge, Massachusetts, USA, November 2-4, 2009, pp. 297-304, 2009, ACM, 978-1-60558-772-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, mobile computing, biometrics, ECG |
11 | Bo Wang, Ruizhong Wei |
Zero-knowledge trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, CSCWD 2009, April 22-24, 2009, Santiago, Chile, pp. 390-395, 2009, IEEE, 978-1-4244-3534-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Adam J. Lee, Ting Yu 0001 |
Towards a dynamic and composable model of trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 217-226, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
trust, policy, reputation, credentials |
11 | Akiko Orita, Hisakazu Hada |
Is that really you?: an approach to assure identity without revealing real-name online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 17-20, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, identity, twitter, identity theft, linkability, impersonation |
11 | Ueli M. Maurer |
Unifying Zero-Knowledge Proofs of Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 272-286, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Sarbari Gupta |
Personal identity verification (PIV) cards as federated identities: challenges and opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 15-22, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance |
11 | Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham |
Randomizable Proofs and Delegatable Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 108-125, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Siani Pearson, Marco Casassa Mont, Manny Novoa |
Securing Information Transfer in Distributed Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(1), pp. 34-42, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala |
Scheduling execution of credentials in constrained secure environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 61-70, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
onboard credentials, secure execution environments, trusted hardware, scheduling |
11 | Vicente Benjumea, Seung Geol Choi, Javier López 0001, Moti Yung |
Fair Traceable Multi-Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 231-246, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Bart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype |
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 118-133, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
electronic healthcare, privacy, anonymous credentials |
11 | Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta |
Levels of Assurance and Reauthentication in Federated Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 89-103, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
reauthentication, LoA, eduGAIN, authorization, federation, SSO |
11 | Jason Crampton, Hoon Wei Lim |
Role Signatures for Access Control in Open Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 205-220, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Qianhong Wu, Bo Qin, Yi Mu 0001, Willy Susilo |
Privacy for Private Key in Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 84-95, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymous identity, Key indistinguishability, Key leakage, Pairing groups, Key privacy, Chosen message attack |
11 | Carlo Argiolas, Nicoletta Dessì, Maria Grazia Fugini |
Modeling Trust Relationships in Collaborative Engineering Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UNISCON ![In: Information Systems and e-Business Technologies, 2nd International United Information Systems Conference, UNISCON 2008, Klagenfurt, Austria, April 22-25, 2008, Proceedings, pp. 555-566, 2008, Springer, 978-3-540-78941-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
engineering projects, Security, Web services, trust, grid services |
11 | Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya |
P-signatures and Noninteractive Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 356-374, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Vladimir Kolesnikov, Charles Rackoff |
Password Mistyping in Two-Factor-Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 702-714, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Stanislaw Jarecki, Xiaomin Liu |
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 715-726, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Daniel Díaz Sánchez, Andrés Marín López, Florina Almenárez, Celeste Campo, Alberto Cortés, Carlos García-Rubio |
Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWCN/PWC ![In: Wireless and Mobile Networking, IFIP Joint Conference on Mobile and Wireless Communications Networks (MWCN'2008) and Personal Wireless Communications (PWC'2008), Toulouse, France, September 30 - October 2, 2008, pp. 271-282, 2008, Springer, 978-0-387-84838-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jan Camenisch, Rafik Chaabouni, Abhi Shelat |
Efficient Protocols for Set Membership and Range Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 234-252, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Range proofs, set membership proofs, bi-linear maps, proofs of knowledge |
11 | Sergey Bratus, Nihal D'Cunha, Evan R. Sparks, Sean W. Smith |
TOCTOU, Traps, and Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 14-32, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Yan He 0001, Miaoliang Zhu, Chunying Zheng |
An Efficient and Minimum Sensitivity Cost Negotiation Strategy in Automated Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 182-185, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Deholo Nali, Paul C. van Oorschot |
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 130-145, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Ramaswamy Chandramouli |
Policy Specification and Enforcement for Smart ID Cards Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 127-134, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XML, Smart Cards, XSLT, Identity Management |
11 | Yu Zhang |
An Open Framework for Remote Electronic Elections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 304-316, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky |
Circular-Secure Encryption from Decision Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 108-125, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Chuan Yue, Haining Wang |
Anti-Phishing in Offense and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 345-354, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Karl Krukow, Mogens Nielsen |
Trust structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(2-3), pp. 153-181, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust structures, Denotational and operational semantics, Trust management, I/O automata, Foundations |
11 | Jesus Luna, Manel Medina, Oscar Manso |
Using OGRO and CertiVeR to improve OCSP validation for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 42(3), pp. 253-266, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CertiVeR, Grid validation, Grid validation policy, Online Certificate Status Protocol, Open Grid OCSP, Prevalidation |
11 | Ramaswamy Chandramouli, Philip Lee |
Infrastructure Standards for Smart ID Card Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(2), pp. 92-96, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|