|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5224 occurrences of 2354 keywords
|
|
|
Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
31 | Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno |
Identity Management: State of the Art, Challenges and Perspectives. |
Privacy and Identity Management |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Lothar Fritsch |
Privacy dark patterns in identity management. |
Open Identity Summit |
2017 |
DBLP BibTeX RDF |
|
31 | Pritam Dash, Christof Rabensteiner, Felix Hörandner, Simon Roth 0001 |
Towards Privacy-Preserving and User-Centric Identity Management as a Service. |
Open Identity Summit |
2017 |
DBLP BibTeX RDF |
|
31 | Ricardo Neisse, Gary Steri, Igor Nai Fovino |
Blockchain-based Identity Management and Data Usage Control (Extended Abstract). |
Privacy and Identity Management |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Bud P. Bruegger, Heiko Roßnagel |
Towards a Decentralized Identity Management Ecosystem for Europe and Beyond. |
Open Identity Summit |
2016 |
DBLP BibTeX RDF |
|
31 | Oliver Terbu, Stefan Vogl, Sebastian Zehetbauer |
One mobile ID to secure physical and digital identity. |
Open Identity Summit |
2016 |
DBLP BibTeX RDF |
|
31 | Sebastian Kurowski |
Risk-centred role engineering within identity data audits - Continuous improvement of the rights structure and possible risk accumulations. |
Open Identity Summit |
2016 |
DBLP BibTeX RDF |
|
31 | Sean Simpson, Thomas Groß 0001 |
A Survey of Security Analysis in Federated Identity Management. |
Privacy and Identity Management |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Kovila P. L. Coopamootoo, Thomas Groß 0001 |
Evidence-Based Methods for Privacy and Identity Management. |
Privacy and Identity Management |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, Simone Fischer-Hübner |
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider. |
Privacy and Identity Management |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Nicolas Fähnrich, Michael Kubach |
Identity management and cloud computing in the automotive industry: first empirical results from a quantitative survey. |
Open Identity Summit |
2015 |
DBLP BibTeX RDF |
|
31 | Rachelle Sellung, Heiko Roßnagel |
Evaluating complex identity management systems - the futureid approach. |
Open Identity Summit |
2015 |
DBLP BibTeX RDF |
|
31 | Jessica Schroers, Pagona Tsormpatzoudi |
Identity-Theft Through e-Government Services - Government to Pay the Bill? |
Privacy and Identity Management |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Maurizio Talamo, Selvakumar Ramachandran, Maria-Laura Barchiesi, Daniela Merella, Christian H. Schunck |
Towards a seamless digital Europe: the SSEDIC recommendations on digital identity management. |
Open Identity Summit |
2014 |
DBLP BibTeX RDF |
|
31 | Nicolas Fähnrich, Michael Kubach |
Analyzing the state-of-the-art of scientific publications on identity management: is there an economic perspective? |
Open Identity Summit |
2014 |
DBLP BibTeX RDF |
|
31 | Ahmad Sabouri, Kai Rannenberg |
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life. |
Privacy and Identity Management |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Stephan Sädtler |
Identity management in cloud computing in conformity with European union law? - problems and approaches pursuant to the proposal for a regulation by the European commission on electronic identification and trust services for electronic transactions in the internal market. |
Open Identity Summit |
2013 |
DBLP BibTeX RDF |
|
31 | Hermann Strack |
Authentication and security integration for ecampus services at the university of applied sciences harz using the German electronic identity card/eid and egovernment standards. |
Open Identity Summit |
2013 |
DBLP BibTeX RDF |
|
31 | Simon Thiel, Fabian Hermann, Marcel Heupel, Mohamed Bourimi |
Unlinkability support in a decentralised, multiple-identity social network. |
Open Identity Summit |
2013 |
DBLP BibTeX RDF |
|
31 | Svetlana Sapelova, Borka Jerman-Blazic |
Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case. |
Privacy and Identity Management |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Gergely Alpár, Maarten H. Everts |
Mobile Devices to the Identity Rescue. |
Privacy and Identity Management |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Liesbet van Zoonen, Georgina Turner |
Taboos and desires of the UK public for identity management in the future: findings from two survey games. |
Digital Identity Management |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Sacha Brostoff, Charlene Jennett, Miguel Malheiros, Martina Angela Sasse |
Federated identity to access e-government services: are citizens ready for this? |
Digital Identity Management |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Bian Yang, Christoph Busch 0001, Julien Bringer, Els Kindt, Willem Ronald Belser, Uwe Seidel, Edward Springmann, Uwe Rabeler, Andreas Wolf 0002, Magnar Aukrust |
Towards standardizing trusted evidence of identity. |
Digital Identity Management |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Lilia Gomez Flores, Sandra Wilson, Dougie Kinnear |
Probing identity management: preliminary findings. |
Digital Identity Management |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Marc-Michael Bergfeld, Stephan Spitz |
Privacy and Identity Management on Mobile Devices: Emerging Technologies and Future Directions for Innovation. |
Privacy and Identity Management for Life |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Jaromir Dobias, Marit Hansen, Stefan Köpsell, Maren Raguse, Arnold Roosendaal, Andreas Pfitzmann, Sandra Steinbrecher, Katalin Storf, Harald Zwingelberg |
Identity and Privacy Issues Throughout Life. |
Privacy and Identity Management for Life |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Sascha Koschinat, Gökhan Bal, Christian Weber, Kai Rannenberg |
Privacy by Sustainable Identity Management Enablers. |
Privacy and Identity Management for Life |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Jan Camenisch |
Identity management tools for protecting online privacy. |
Digital Identity Management |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Yuan Cao, Lin Yang |
GISL: a generalized identity specification language based on XML schema. |
Digital Identity Management |
2011 |
DBLP DOI BibTeX RDF |
|
31 | W. Michael Petullo, Jon A. Solworth |
Digital identity security architecture in Ethos. |
Digital Identity Management |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino |
Privacy preserving identity attribute verification in windows cardspace. |
Digital Identity Management |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Eike Kiltz, Gregory Neven |
Identity-Based Signatures. |
Identity-Based Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault |
Identity-Based Identification and Signature Schemes using Error Correcting Codes. |
Identity-Based Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Antoine Joux |
Introduction to Identity-Based Cryptography. |
Identity-Based Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Kai Rannenberg, Denis Royer |
Open Challenges - Towards the (Not So Distant) Future of Identity. |
The Future of Identity in the Information Society |
2009 |
DBLP DOI BibTeX RDF |
|
31 | James Backhouse, Ruth Halperin |
Approaching Interoperability for Identity Management Systems. |
The Future of Identity in the Information Society |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Denis Royer, André Deuker, Kai Rannenberg |
Mobility and Identity. |
The Future of Identity in the Information Society |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Maike Gilliot, Vashek Matyas, Sven Wohlgemuth |
Privacy and Identity. |
The Future of Identity in the Information Society |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Bert-Jaap Koops, Zeno J. M. H. Geradts |
Identity-Related Crime and Forensics. |
The Future of Identity in the Information Society |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Jingwei Huang 0002, David M. Nicol |
A calculus of trust and its application to PKI and identity management. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
semantics of trust, social networks, uncertainty, PKI, risk assessment, identity management, trust modeling |
31 | Markus Bylund, Jussi Karlgren, Fredrik Olsson, Pedro Sanches 0001, Carl-Henrik Arvidsson |
Mirroring your web presence. |
SSM |
2008 |
DBLP DOI BibTeX RDF |
computational stylistics, information refinement, privacy, digital identity, social identity, language technology |
31 | Yusuf Pisan |
My guild, my people: role of guilds in massively multiplayer online games. |
IE |
2007 |
DBLP BibTeX RDF |
group identity, virtual environments, games, digital identity, MMOs |
31 | Mikhail V. Volkov 0001 |
Checking quasi-identities in a finite semigroup may be computationally hard. |
Stud Logica |
2004 |
DBLP DOI BibTeX RDF |
quasi-identity, NP-completeness, identity, semigroup |
31 | Thomas Groß 0001, Birgit Pfitzmann |
Proving a WS-Federation passive requestor profile. |
SWS |
2004 |
DBLP DOI BibTeX RDF |
WS-federation passive requestor profile, WSFPI, browser-based, security proof of protocols, single signon, security, web browser, web service security, federated identity management, identity federation |
30 | Christian Emig, Frank Brandt, Sebastian Kreuzer, Sebastian Abeck |
Identity as a Service - Towards a Service-Oriented Identity Management Architecture. |
EUNICE |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Douglas Thain |
Identity Boxing: A New Technique for Consistent Global Identity. |
SC |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Practical ID-based encryption for wireless sensor network. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
online/offline encryption, identity-based encryption, wireless sensor network security |
30 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Online/offline signature, Mobile ad hoc networks, identity-based cryptography, multisignature, forgery attack |
30 | Corin Pitcher, James Riely |
Dynamic Policy Discovery with Remote Attestation. |
FoSSaCS |
2006 |
DBLP DOI BibTeX RDF |
code-identity based access control, policy establishment, Next Generation Secure Computing Base, ?-calculus, key establishment, remote attestation |
30 | Marco Casassa Mont, Robert Thyne |
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
privacy-aware access control, obligation management, privacy, identity management, policy enforcement |
30 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
30 | Philipp Grabher, Dan Page |
Hardware Acceleration of the Tate Pairing in Characteristic Three. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
FPGA, Elliptic Curve, Pairing, Identity Based Encryption |
29 | Vikraman Arvind, Partha Mukhopadhyay |
Derandomizing the Isolation Lemma and Lower Bounds for Circuit Size. |
APPROX-RANDOM |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Martin Rehák, Michal Pechoucek |
Trust Modeling with Context Representation and Generalized Identities. |
CIA |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Shaoning Pang, Nikola K. Kasabov |
Investigating LLE Eigenface on Pose and Face Identification. |
ISNN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Shaohua Kevin Zhou, Volker Krüger, Rama Chellappa |
Face Recognition from Video: A CONDENSATION Approach. |
FGR |
2002 |
DBLP DOI BibTeX RDF |
Face Recognition from Video, Time Series State Space Model, Entropy, Sequential Monte Carlo |
29 | Shaohua Kevin Zhou, Rama Chellappa |
Probabilistic Human Recognition from Video. |
ECCV (3) |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Lucy Lynch |
Inside the Identity Management Game. |
IEEE Internet Comput. |
2011 |
DBLP DOI BibTeX RDF |
identity standards, identity management, OpenID, OAuth |
28 | Ivonne Thomas, Christoph Meinel |
An Attribute Assurance Framework to Define and Match Trust in Identity Attributes. |
ICWS |
2011 |
DBLP DOI BibTeX RDF |
Attribute Assurance, Trust, Identity, Identity Federation |
28 | Yang Zhang 0015, Junliang Chen |
Universal Identity Management Model Based on Anonymous Credentials. |
IEEE SCC |
2010 |
DBLP DOI BibTeX RDF |
Privacy Concerns of Service-Oriented Solutions, Identity Metasystem, Privilege Delegation, Identity Management |
28 | Gabriel López 0001, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Joao Girão |
A SWIFT Take on Identity Management. |
Computer |
2009 |
DBLP DOI BibTeX RDF |
SWIFT, Privacy, Identity management, SSO, SAML, Security & privacy, Virtual identity |
28 | Farah Layouni, Yann Pollet |
An Ontology-Based Architecture for Federated Identity Management. |
AINA |
2009 |
DBLP DOI BibTeX RDF |
Circle of trust, Identity provider, Ontology, OWL, Service provider, Federated identity |
28 | David W. Chadwick, Kaniz Fatema |
An advanced policy based authorisation infrastructure. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
application independent pep, credential validation service, master pdp, obligations service, pdp, pep, sticky policy |
28 | Jan Camenisch, Thomas Groß 0001, Thomas S. Heydt-Benjamin |
Rethinking accountable privacy supporting services: extended abstract. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
time capsule, privacy, cryptographic protocols, accountability, verifiable encryption, anonymous credential systems |
28 | Giovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim |
Modeling cryptographic properties of voice and voice-based entity authentication. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
modeling human factors, biometrics, voice, entity authentication |
28 | Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas |
A game theoretic model for digital identity and trust in online communities. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
trust, game theory, online communities, digital identity |
28 | Binaebi Akah, Shaowen Bardzell |
Empowering products: personal identity through the act of appropriation. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
creative freedom, do-it-yourself, personal identity, steampunk, design, materiality, appropriation, craft |
28 | Mihir Bellare, Chanathip Namprempre, Gregory Neven |
Security Proofs for Identity-Based Identification and Signature Schemes. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Signatures, Identity-based cryptography, Identification schemes, Security proofs |
28 | Shuigen Yang, Huachun Zhou, Yajuan Qin, Hongke Zhang |
SHIP: Cross-layer mobility management scheme based on Session Initiation Protocol and Host Identity Protocol. |
Telecommun. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Session initiation protocol, Mobility management, Cross-layer design, Host identity protocol |
28 | Mücahit Mutlugün, Oktay Adalier |
Turkish national electronic identity card. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
national identity card, biometrics, smart card, pki |
28 | Christian Schridde, Matthew Smith 0001, Bernd Freisleben |
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
network security, denial-of-service, signatures, identity-based cryptography, IP spoofing |
28 | Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda |
All your contacts are belong to us: automated identity theft attacks on social networks. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
social network security, identity theft |
28 | Jun Hu, Liam Peyton |
Integrating Identity Management With Federated Healthcare Data Models. |
MCETECH |
2009 |
DBLP DOI BibTeX RDF |
Federated data model, record linking, data consolidation, health care data, privacy, identity |
28 | Hongwei Li 0001, Yuanshun Dai, Ling Tian, Haomiao Yang |
Identity-Based Authentication for Cloud Computing. |
CloudCom |
2009 |
DBLP DOI BibTeX RDF |
authentication, cloud computing, identity-based cryptography |
28 | Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi |
Efficient identity-based authentication for IMS based services access. |
MoMM |
2009 |
DBLP DOI BibTeX RDF |
identity based cryptography (IBC), personalized access, service authentication, IP multimedia subsystem (IMS) |
28 | Amy L. Gonzales, Thomas Finley, Stuart Paul Duncan |
(Perceived) interactivity: does interactivity increase enjoyment and creative identity in artistic spaces? |
CHI |
2009 |
DBLP DOI BibTeX RDF |
music installation, user enjoyment, creativity, identity, interactive art |
28 | László Bokor, Szabolcs Nováczki, László Tamás Zeke, Gábor Jeney |
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++. |
MSWiM |
2009 |
DBLP DOI BibTeX RDF |
INET, handover performance, real-life hip testbed, C++, OMNeT++, simulation framework, host identity protocol (HIP), protocol simulation |
28 | Lei Zhang 0009, Qianhong Wu, Bo Qin |
Identity-Based Verifiably Encrypted Signatures without Random Oracles. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature |
28 | Benoît Libert, Damien Vergnaud |
Adaptive-ID Secure Revocable Identity-Based Encryption. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
provable security, revocation, Identity-based encryption |
28 | Vipul Goyal, Steve Lu 0001, Amit Sahai, Brent Waters |
Black-box accountable authority identity-based encryption. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
accountable authority, identity-based encryption |
28 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar |
Identity-based encryption with efficient revocation. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
provable security, revocation, identity-based encryption |
28 | Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee 0001 |
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
multi-receiver identity-based key encapsulation |
28 | Denis Royer |
Assessing the Value of Enterprise Identity Management (EIdM) - Towards a Generic Evaluation Approach. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
IT Security Investments, Enterprise Identity Management (EIdM), Decision Support, Balanced Scorecard, Cost/Benefit Analysis |
28 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. |
Pairing |
2008 |
DBLP DOI BibTeX RDF |
multi-TA IBE, multiple trusted authorities, anonymity, identity-based encryption |
28 | Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang |
Traceable and Retrievable Identity-Based Encryption. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
PKG, Trust, Retrievability, Traceability, Identity-based Encryption |
28 | Ping Dong, Hongchao Wang, Hongke Zhang |
An efficient approach to map identity onto locator. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
mapping, locator, identity |
28 | Anna Cinzia Squicciarini, Alexei Czeskis, Abhilasha Bhargav-Spantzel |
Privacy policies compliance across digital identity management systems. |
SPRINGL |
2008 |
DBLP DOI BibTeX RDF |
privacy, tracing, digital identity |
28 | Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
Identity-Based Encryption, Proxy re-encryption, Personal Health Record |
28 | Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang |
Protecting the Publishing Identity in Multiple Tuples. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Identity, Privacy preservation, Data publishing |
28 | Junichi Kanebako, Atsuhito Sekiguchi |
Vibracion Cajon: a drumming interface that awakes a shared sense of identity. |
Advances in Computer Entertainment Technology |
2008 |
DBLP DOI BibTeX RDF |
drumming interface, groove, shared identity, telexistence, haptic, tangible, session, rhythm, Kansei, intuitive interaction |
28 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
28 | Diego Blanco-Moreno, Jorge J. Gómez-Sanz, Juan Pavón |
Social Identity Management in Social Networks. |
DCAI |
2008 |
DBLP DOI BibTeX RDF |
social network identity, privacy, Social networks |
28 | Joonsang Baek, Willy Susilo, Jianying Zhou 0001 |
New constructions of fuzzy identity-based encryption. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
efficient constructions, fuzzy identity-based encryption |
28 | Tjaart Steyn, Hennie A. Kruger, Lynette Drevin |
Identity Theft - Empirical evidence from a Phishing Exercise. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
phising, education, Identity theft, security awareness |
28 | Yide Shen |
Transactive memory system development in virtual teams: the potential role of shared identity and shared context. |
CPR |
2007 |
DBLP DOI BibTeX RDF |
shared identity, transactive memory system, virtual team, shared context |
28 | Matthew Green 0001, Giuseppe Ateniese |
Identity-Based Proxy Re-encryption. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
identity-based encryption, bilinear maps, proxy re-encryption |
28 | Guomin Yang, Jing Chen 0001, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang 0002 |
A More Natural Way to Construct Identity-Based Identification Schemes. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Concurrent attacks, Identity-based cryptography, Identification schemes |
28 | Latanya Sweeney |
Protecting Job Seekers from Identity Theft. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
phishing, google, identity theft |
28 | Daniel J. Weitzner |
In Search of Manageable Identity Systems. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
credit card authorization systems, identity management, Internet security |
Displaying result #301 - #400 of 14619 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|