The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for identity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1947-1973 (17) 1974-1977 (20) 1978-1980 (15) 1981-1983 (20) 1984 (15) 1985-1986 (19) 1987-1988 (39) 1989 (37) 1990 (37) 1991 (30) 1992 (26) 1993 (32) 1994 (38) 1995 (37) 1996 (43) 1997 (55) 1998 (54) 1999 (93) 2000 (101) 2001 (143) 2002 (186) 2003 (279) 2004 (395) 2005 (600) 2006 (691) 2007 (806) 2008 (793) 2009 (794) 2010 (499) 2011 (572) 2012 (458) 2013 (516) 2014 (559) 2015 (520) 2016 (528) 2017 (595) 2018 (623) 2019 (767) 2020 (808) 2021 (868) 2022 (794) 2023 (888) 2024 (209)
Publication types (Num. hits)
article(6043) book(16) data(4) incollection(190) inproceedings(8179) phdthesis(130) proceedings(57)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5224 occurrences of 2354 keywords

Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
31Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno Identity Management: State of the Art, Challenges and Perspectives. Search on Bibsonomy Privacy and Identity Management The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Lothar Fritsch Privacy dark patterns in identity management. Search on Bibsonomy Open Identity Summit The full citation details ... 2017 DBLP  BibTeX  RDF
31Pritam Dash, Christof Rabensteiner, Felix Hörandner, Simon Roth 0001 Towards Privacy-Preserving and User-Centric Identity Management as a Service. Search on Bibsonomy Open Identity Summit The full citation details ... 2017 DBLP  BibTeX  RDF
31Ricardo Neisse, Gary Steri, Igor Nai Fovino Blockchain-based Identity Management and Data Usage Control (Extended Abstract). Search on Bibsonomy Privacy and Identity Management The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
31Bud P. Bruegger, Heiko Roßnagel Towards a Decentralized Identity Management Ecosystem for Europe and Beyond. Search on Bibsonomy Open Identity Summit The full citation details ... 2016 DBLP  BibTeX  RDF
31Oliver Terbu, Stefan Vogl, Sebastian Zehetbauer One mobile ID to secure physical and digital identity. Search on Bibsonomy Open Identity Summit The full citation details ... 2016 DBLP  BibTeX  RDF
31Sebastian Kurowski Risk-centred role engineering within identity data audits - Continuous improvement of the rights structure and possible risk accumulations. Search on Bibsonomy Open Identity Summit The full citation details ... 2016 DBLP  BibTeX  RDF
31Sean Simpson, Thomas Groß 0001 A Survey of Security Analysis in Federated Identity Management. Search on Bibsonomy Privacy and Identity Management The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Kovila P. L. Coopamootoo, Thomas Groß 0001 Evidence-Based Methods for Privacy and Identity Management. Search on Bibsonomy Privacy and Identity Management The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, Simone Fischer-Hübner Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider. Search on Bibsonomy Privacy and Identity Management The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
31Nicolas Fähnrich, Michael Kubach Identity management and cloud computing in the automotive industry: first empirical results from a quantitative survey. Search on Bibsonomy Open Identity Summit The full citation details ... 2015 DBLP  BibTeX  RDF
31Rachelle Sellung, Heiko Roßnagel Evaluating complex identity management systems - the futureid approach. Search on Bibsonomy Open Identity Summit The full citation details ... 2015 DBLP  BibTeX  RDF
31Jessica Schroers, Pagona Tsormpatzoudi Identity-Theft Through e-Government Services - Government to Pay the Bill? Search on Bibsonomy Privacy and Identity Management The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Maurizio Talamo, Selvakumar Ramachandran, Maria-Laura Barchiesi, Daniela Merella, Christian H. Schunck Towards a seamless digital Europe: the SSEDIC recommendations on digital identity management. Search on Bibsonomy Open Identity Summit The full citation details ... 2014 DBLP  BibTeX  RDF
31Nicolas Fähnrich, Michael Kubach Analyzing the state-of-the-art of scientific publications on identity management: is there an economic perspective? Search on Bibsonomy Open Identity Summit The full citation details ... 2014 DBLP  BibTeX  RDF
31Ahmad Sabouri, Kai Rannenberg ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life. Search on Bibsonomy Privacy and Identity Management The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
31Stephan Sädtler Identity management in cloud computing in conformity with European union law? - problems and approaches pursuant to the proposal for a regulation by the European commission on electronic identification and trust services for electronic transactions in the internal market. Search on Bibsonomy Open Identity Summit The full citation details ... 2013 DBLP  BibTeX  RDF
31Hermann Strack Authentication and security integration for ecampus services at the university of applied sciences harz using the German electronic identity card/eid and egovernment standards. Search on Bibsonomy Open Identity Summit The full citation details ... 2013 DBLP  BibTeX  RDF
31Simon Thiel, Fabian Hermann, Marcel Heupel, Mohamed Bourimi Unlinkability support in a decentralised, multiple-identity social network. Search on Bibsonomy Open Identity Summit The full citation details ... 2013 DBLP  BibTeX  RDF
31Svetlana Sapelova, Borka Jerman-Blazic Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case. Search on Bibsonomy Privacy and Identity Management The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Gergely Alpár, Maarten H. Everts Mobile Devices to the Identity Rescue. Search on Bibsonomy Privacy and Identity Management The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Liesbet van Zoonen, Georgina Turner Taboos and desires of the UK public for identity management in the future: findings from two survey games. Search on Bibsonomy Digital Identity Management The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Sacha Brostoff, Charlene Jennett, Miguel Malheiros, Martina Angela Sasse Federated identity to access e-government services: are citizens ready for this? Search on Bibsonomy Digital Identity Management The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Bian Yang, Christoph Busch 0001, Julien Bringer, Els Kindt, Willem Ronald Belser, Uwe Seidel, Edward Springmann, Uwe Rabeler, Andreas Wolf 0002, Magnar Aukrust Towards standardizing trusted evidence of identity. Search on Bibsonomy Digital Identity Management The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Lilia Gomez Flores, Sandra Wilson, Dougie Kinnear Probing identity management: preliminary findings. Search on Bibsonomy Digital Identity Management The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
31Marc-Michael Bergfeld, Stephan Spitz Privacy and Identity Management on Mobile Devices: Emerging Technologies and Future Directions for Innovation. Search on Bibsonomy Privacy and Identity Management for Life The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Jaromir Dobias, Marit Hansen, Stefan Köpsell, Maren Raguse, Arnold Roosendaal, Andreas Pfitzmann, Sandra Steinbrecher, Katalin Storf, Harald Zwingelberg Identity and Privacy Issues Throughout Life. Search on Bibsonomy Privacy and Identity Management for Life The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Sascha Koschinat, Gökhan Bal, Christian Weber, Kai Rannenberg Privacy by Sustainable Identity Management Enablers. Search on Bibsonomy Privacy and Identity Management for Life The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Jan Camenisch Identity management tools for protecting online privacy. Search on Bibsonomy Digital Identity Management The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Yuan Cao, Lin Yang GISL: a generalized identity specification language based on XML schema. Search on Bibsonomy Digital Identity Management The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31W. Michael Petullo, Jon A. Solworth Digital identity security architecture in Ethos. Search on Bibsonomy Digital Identity Management The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
31Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino Privacy preserving identity attribute verification in windows cardspace. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
31Eike Kiltz, Gregory Neven Identity-Based Signatures. Search on Bibsonomy Identity-Based Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault Identity-Based Identification and Signature Schemes using Error Correcting Codes. Search on Bibsonomy Identity-Based Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Antoine Joux Introduction to Identity-Based Cryptography. Search on Bibsonomy Identity-Based Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Kai Rannenberg, Denis Royer Open Challenges - Towards the (Not So Distant) Future of Identity. Search on Bibsonomy The Future of Identity in the Information Society The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31James Backhouse, Ruth Halperin Approaching Interoperability for Identity Management Systems. Search on Bibsonomy The Future of Identity in the Information Society The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Denis Royer, André Deuker, Kai Rannenberg Mobility and Identity. Search on Bibsonomy The Future of Identity in the Information Society The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Maike Gilliot, Vashek Matyas, Sven Wohlgemuth Privacy and Identity. Search on Bibsonomy The Future of Identity in the Information Society The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Bert-Jaap Koops, Zeno J. M. H. Geradts Identity-Related Crime and Forensics. Search on Bibsonomy The Future of Identity in the Information Society The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Jingwei Huang 0002, David M. Nicol A calculus of trust and its application to PKI and identity management. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF semantics of trust, social networks, uncertainty, PKI, risk assessment, identity management, trust modeling
31Markus Bylund, Jussi Karlgren, Fredrik Olsson, Pedro Sanches 0001, Carl-Henrik Arvidsson Mirroring your web presence. Search on Bibsonomy SSM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computational stylistics, information refinement, privacy, digital identity, social identity, language technology
31Yusuf Pisan My guild, my people: role of guilds in massively multiplayer online games. Search on Bibsonomy IE The full citation details ... 2007 DBLP  BibTeX  RDF group identity, virtual environments, games, digital identity, MMOs
31Mikhail V. Volkov 0001 Checking quasi-identities in a finite semigroup may be computationally hard. Search on Bibsonomy Stud Logica The full citation details ... 2004 DBLP  DOI  BibTeX  RDF quasi-identity, NP-completeness, identity, semigroup
31Thomas Groß 0001, Birgit Pfitzmann Proving a WS-Federation passive requestor profile. Search on Bibsonomy SWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WS-federation passive requestor profile, WSFPI, browser-based, security proof of protocols, single signon, security, web browser, web service security, federated identity management, identity federation
30Christian Emig, Frank Brandt, Sebastian Kreuzer, Sebastian Abeck Identity as a Service - Towards a Service-Oriented Identity Management Architecture. Search on Bibsonomy EUNICE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Douglas Thain Identity Boxing: A New Technique for Consistent Global Identity. Search on Bibsonomy SC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Practical ID-based encryption for wireless sensor network. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF online/offline encryption, identity-based encryption, wireless sensor network security
30Fagen Li, Masaaki Shirase, Tsuyoshi Takagi On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online/offline signature, Mobile ad hoc networks, identity-based cryptography, multisignature, forgery attack
30Corin Pitcher, James Riely Dynamic Policy Discovery with Remote Attestation. Search on Bibsonomy FoSSaCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF code-identity based access control, policy establishment, Next Generation Secure Computing Base, ?-calculus, key establishment, remote attestation
30Marco Casassa Mont, Robert Thyne A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy-aware access control, obligation management, privacy, identity management, policy enforcement
30Lan Nguyen Accumulators from Bilinear Pairings and Applications. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators
30Philipp Grabher, Dan Page Hardware Acceleration of the Tate Pairing in Characteristic Three. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF FPGA, Elliptic Curve, Pairing, Identity Based Encryption
29Vikraman Arvind, Partha Mukhopadhyay Derandomizing the Isolation Lemma and Lower Bounds for Circuit Size. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Martin Rehák, Michal Pechoucek Trust Modeling with Context Representation and Generalized Identities. Search on Bibsonomy CIA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Shaoning Pang, Nikola K. Kasabov Investigating LLE Eigenface on Pose and Face Identification. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Shaohua Kevin Zhou, Volker Krüger, Rama Chellappa Face Recognition from Video: A CONDENSATION Approach. Search on Bibsonomy FGR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Face Recognition from Video, Time Series State Space Model, Entropy, Sequential Monte Carlo
29Shaohua Kevin Zhou, Rama Chellappa Probabilistic Human Recognition from Video. Search on Bibsonomy ECCV (3) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Lucy Lynch Inside the Identity Management Game. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF identity standards, identity management, OpenID, OAuth
28Ivonne Thomas, Christoph Meinel An Attribute Assurance Framework to Define and Match Trust in Identity Attributes. Search on Bibsonomy ICWS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Attribute Assurance, Trust, Identity, Identity Federation
28Yang Zhang 0015, Junliang Chen Universal Identity Management Model Based on Anonymous Credentials. Search on Bibsonomy IEEE SCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Privacy Concerns of Service-Oriented Solutions, Identity Metasystem, Privilege Delegation, Identity Management
28Gabriel López 0001, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Joao Girão A SWIFT Take on Identity Management. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SWIFT, Privacy, Identity management, SSO, SAML, Security & privacy, Virtual identity
28Farah Layouni, Yann Pollet An Ontology-Based Architecture for Federated Identity Management. Search on Bibsonomy AINA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Circle of trust, Identity provider, Ontology, OWL, Service provider, Federated identity
28David W. Chadwick, Kaniz Fatema An advanced policy based authorisation infrastructure. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF application independent pep, credential validation service, master pdp, obligations service, pdp, pep, sticky policy
28Jan Camenisch, Thomas Groß 0001, Thomas S. Heydt-Benjamin Rethinking accountable privacy supporting services: extended abstract. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF time capsule, privacy, cryptographic protocols, accountability, verifiable encryption, anonymous credential systems
28Giovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim Modeling cryptographic properties of voice and voice-based entity authentication. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF modeling human factors, biometrics, voice, entity authentication
28Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas A game theoretic model for digital identity and trust in online communities. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF trust, game theory, online communities, digital identity
28Binaebi Akah, Shaowen Bardzell Empowering products: personal identity through the act of appropriation. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF creative freedom, do-it-yourself, personal identity, steampunk, design, materiality, appropriation, craft
28Mihir Bellare, Chanathip Namprempre, Gregory Neven Security Proofs for Identity-Based Identification and Signature Schemes. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Signatures, Identity-based cryptography, Identification schemes, Security proofs
28Shuigen Yang, Huachun Zhou, Yajuan Qin, Hongke Zhang SHIP: Cross-layer mobility management scheme based on Session Initiation Protocol and Host Identity Protocol. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Session initiation protocol, Mobility management, Cross-layer design, Host identity protocol
28Mücahit Mutlugün, Oktay Adalier Turkish national electronic identity card. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF national identity card, biometrics, smart card, pki
28Christian Schridde, Matthew Smith 0001, Bernd Freisleben TrueIP: prevention of IP spoofing attacks using identity-based cryptography. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, denial-of-service, signatures, identity-based cryptography, IP spoofing
28Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda All your contacts are belong to us: automated identity theft attacks on social networks. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF social network security, identity theft
28Jun Hu, Liam Peyton Integrating Identity Management With Federated Healthcare Data Models. Search on Bibsonomy MCETECH The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Federated data model, record linking, data consolidation, health care data, privacy, identity
28Hongwei Li 0001, Yuanshun Dai, Ling Tian, Haomiao Yang Identity-Based Authentication for Cloud Computing. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, cloud computing, identity-based cryptography
28Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi Efficient identity-based authentication for IMS based services access. Search on Bibsonomy MoMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity based cryptography (IBC), personalized access, service authentication, IP multimedia subsystem (IMS)
28Amy L. Gonzales, Thomas Finley, Stuart Paul Duncan (Perceived) interactivity: does interactivity increase enjoyment and creative identity in artistic spaces? Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF music installation, user enjoyment, creativity, identity, interactive art
28László Bokor, Szabolcs Nováczki, László Tamás Zeke, Gábor Jeney Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++. Search on Bibsonomy MSWiM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF INET, handover performance, real-life hip testbed, C++, OMNeT++, simulation framework, host identity protocol (HIP), protocol simulation
28Lei Zhang 0009, Qianhong Wu, Bo Qin Identity-Based Verifiably Encrypted Signatures without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature
28Benoît Libert, Damien Vergnaud Adaptive-ID Secure Revocable Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF provable security, revocation, Identity-based encryption
28Vipul Goyal, Steve Lu 0001, Amit Sahai, Brent Waters Black-box accountable authority identity-based encryption. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF accountable authority, identity-based encryption
28Alexandra Boldyreva, Vipul Goyal, Virendra Kumar Identity-based encryption with efficient revocation. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provable security, revocation, identity-based encryption
28Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee 0001 Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi-receiver identity-based key encapsulation
28Denis Royer Assessing the Value of Enterprise Identity Management (EIdM) - Towards a Generic Evaluation Approach. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IT Security Investments, Enterprise Identity Management (EIdM), Decision Support, Balanced Scorecard, Cost/Benefit Analysis
28Kenneth G. Paterson, Sriramkrishnan Srinivasan Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi-TA IBE, multiple trusted authorities, anonymity, identity-based encryption
28Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang Traceable and Retrievable Identity-Based Encryption. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PKG, Trust, Retrievability, Traceability, Identity-based Encryption
28Ping Dong, Hongchao Wang, Hongke Zhang An efficient approach to map identity onto locator. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mapping, locator, identity
28Anna Cinzia Squicciarini, Alexei Czeskis, Abhilasha Bhargav-Spantzel Privacy policies compliance across digital identity management systems. Search on Bibsonomy SPRINGL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, tracing, digital identity
28Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identity-Based Encryption, Proxy re-encryption, Personal Health Record
28Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang Protecting the Publishing Identity in Multiple Tuples. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anonymity, Identity, Privacy preservation, Data publishing
28Junichi Kanebako, Atsuhito Sekiguchi Vibracion Cajon: a drumming interface that awakes a shared sense of identity. Search on Bibsonomy Advances in Computer Entertainment Technology The full citation details ... 2008 DBLP  DOI  BibTeX  RDF drumming interface, groove, shared identity, telexistence, haptic, tangible, session, rhythm, Kansei, intuitive interaction
28Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability
28Diego Blanco-Moreno, Jorge J. Gómez-Sanz, Juan Pavón Social Identity Management in Social Networks. Search on Bibsonomy DCAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF social network identity, privacy, Social networks
28Joonsang Baek, Willy Susilo, Jianying Zhou 0001 New constructions of fuzzy identity-based encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF efficient constructions, fuzzy identity-based encryption
28Tjaart Steyn, Hennie A. Kruger, Lynette Drevin Identity Theft - Empirical evidence from a Phishing Exercise. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF phising, education, Identity theft, security awareness
28Yide Shen Transactive memory system development in virtual teams: the potential role of shared identity and shared context. Search on Bibsonomy CPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF shared identity, transactive memory system, virtual team, shared context
28Matthew Green 0001, Giuseppe Ateniese Identity-Based Proxy Re-encryption. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity-based encryption, bilinear maps, proxy re-encryption
28Guomin Yang, Jing Chen 0001, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang 0002 A More Natural Way to Construct Identity-Based Identification Schemes. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Concurrent attacks, Identity-based cryptography, Identification schemes
28Latanya Sweeney Protecting Job Seekers from Identity Theft. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF phishing, google, identity theft
28Daniel J. Weitzner In Search of Manageable Identity Systems. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF credit card authorization systems, identity management, Internet security
Displaying result #301 - #400 of 14619 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license