|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5224 occurrences of 2354 keywords
|
|
|
Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
31 | Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno |
Identity Management: State of the Art, Challenges and Perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers, pp. 45-62, 2019, Springer, 978-3-030-42503-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Lothar Fritsch |
Privacy dark patterns in identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2017, October 5-6, 2017, Karlstad University, Sweden., pp. 93-104, 2017, Gesellschaft für Informatik, Bonn / GI. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
31 | Pritam Dash, Christof Rabensteiner, Felix Hörandner, Simon Roth 0001 |
Towards Privacy-Preserving and User-Centric Identity Management as a Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2017, October 5-6, 2017, Karlstad University, Sweden., pp. 105-116, 2017, Gesellschaft für Informatik, Bonn / GI. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
31 | Ricardo Neisse, Gary Steri, Igor Nai Fovino |
Blockchain-based Identity Management and Data Usage Control (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pp. 237-239, 2017, Springer, 978-3-319-92924-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Bud P. Bruegger, Heiko Roßnagel |
Towards a Decentralized Identity Management Ecosystem for Europe and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2016, 13.-14. October 2016, Rome, Italy, pp. 55-66, 2016, GI. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Oliver Terbu, Stefan Vogl, Sebastian Zehetbauer |
One mobile ID to secure physical and digital identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2016, 13.-14. October 2016, Rome, Italy, pp. 43-54, 2016, GI. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Sebastian Kurowski |
Risk-centred role engineering within identity data audits - Continuous improvement of the rights structure and possible risk accumulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2016, 13.-14. October 2016, Rome, Italy, pp. 117-133, 2016, GI. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
31 | Sean Simpson, Thomas Groß 0001 |
A Survey of Security Analysis in Federated Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, pp. 231-247, 2016, 978-3-319-55782-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Kovila P. L. Coopamootoo, Thomas Groß 0001 |
Evidence-Based Methods for Privacy and Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, pp. 105-121, 2016, 978-3-319-55782-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, Simone Fischer-Hübner |
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers, pp. 76-91, 2016, 978-3-319-55782-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Nicolas Fähnrich, Michael Kubach |
Identity management and cloud computing in the automotive industry: first empirical results from a quantitative survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2015, 10.-11. November 2015, Berlin, Germany, pp. 15-27, 2015, GI, 978-3-88579-645-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
31 | Rachelle Sellung, Heiko Roßnagel |
Evaluating complex identity management systems - the futureid approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2015, 10.-11. November 2015, Berlin, Germany, pp. 133-139, 2015, GI, 978-3-88579-645-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
31 | Jessica Schroers, Pagona Tsormpatzoudi |
Identity-Theft Through e-Government Services - Government to Pay the Bill? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, pp. 253-264, 2015, Springer, 978-3-319-41762-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Maurizio Talamo, Selvakumar Ramachandran, Maria-Laura Barchiesi, Daniela Merella, Christian H. Schunck |
Towards a seamless digital Europe: the SSEDIC recommendations on digital identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2014, November 4-6, 2014, Stuttgart, Germany, pp. 62-72, 2014, GI. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Nicolas Fähnrich, Michael Kubach |
Analyzing the state-of-the-art of scientific publications on identity management: is there an economic perspective? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2014, November 4-6, 2014, Stuttgart, Germany, pp. 127-132, 2014, GI. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Ahmad Sabouri, Kai Rannenberg |
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management for the Future Internet in the Age of Globalisation - 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers, pp. 3-16, 2014, Springer, 978-3-319-18620-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Stephan Sädtler |
Identity management in cloud computing in conformity with European union law? - problems and approaches pursuant to the proposal for a regulation by the European commission on electronic identification and trust services for electronic transactions in the internal market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2013, September 9th - 11th 2013, Kloster Banz, Germany, pp. 118-129, 2013, GI. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
31 | Hermann Strack |
Authentication and security integration for ecampus services at the university of applied sciences harz using the German electronic identity card/eid and egovernment standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2013, September 9th - 11th 2013, Kloster Banz, Germany, pp. 179-181, 2013, GI. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
31 | Simon Thiel, Fabian Hermann, Marcel Heupel, Mohamed Bourimi |
Unlinkability support in a decentralised, multiple-identity social network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Open Identity Summit ![In: Open Identity Summit 2013, September 9th - 11th 2013, Kloster Banz, Germany, pp. 32-42, 2013, GI. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
31 | Svetlana Sapelova, Borka Jerman-Blazic |
Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management for Emerging Services and Technologies - 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, pp. 214-223, 2013, Springer, 978-3-642-55136-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Gergely Alpár, Maarten H. Everts |
Mobile Devices to the Identity Rescue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management for Emerging Services and Technologies - 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, pp. 237-247, 2013, Springer, 978-3-642-55136-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Liesbet van Zoonen, Georgina Turner |
Taboos and desires of the UK public for identity management in the future: findings from two survey games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: DIM'13, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013, pp. 37-44, 2013, ACM, 978-1-4503-2493-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Sacha Brostoff, Charlene Jennett, Miguel Malheiros, Martina Angela Sasse |
Federated identity to access e-government services: are citizens ready for this? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: DIM'13, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013, pp. 97-108, 2013, ACM, 978-1-4503-2493-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Bian Yang, Christoph Busch 0001, Julien Bringer, Els Kindt, Willem Ronald Belser, Uwe Seidel, Edward Springmann, Uwe Rabeler, Andreas Wolf 0002, Magnar Aukrust |
Towards standardizing trusted evidence of identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: DIM'13, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013, pp. 63-72, 2013, ACM, 978-1-4503-2493-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Lilia Gomez Flores, Sandra Wilson, Dougie Kinnear |
Probing identity management: preliminary findings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: DIM'13, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013, pp. 45-50, 2013, ACM, 978-1-4503-2493-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
31 | Marc-Michael Bergfeld, Stephan Spitz |
Privacy and Identity Management on Mobile Devices: Emerging Technologies and Future Directions for Innovation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management for Life ![In: Privacy and Identity Management for Life, pp. 413-430, 2011, Springer, 978-3-642-20316-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Jaromir Dobias, Marit Hansen, Stefan Köpsell, Maren Raguse, Arnold Roosendaal, Andreas Pfitzmann, Sandra Steinbrecher, Katalin Storf, Harald Zwingelberg |
Identity and Privacy Issues Throughout Life. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management for Life ![In: Privacy and Identity Management for Life, pp. 87-110, 2011, Springer, 978-3-642-20316-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Sascha Koschinat, Gökhan Bal, Christian Weber, Kai Rannenberg |
Privacy by Sustainable Identity Management Enablers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management for Life ![In: Privacy and Identity Management for Life, pp. 431-452, 2011, Springer, 978-3-642-20316-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Jan Camenisch |
Identity management tools for protecting online privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA - October 21, 2011, pp. 1-2, 2011, ACM, 978-1-4503-1006-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Yuan Cao, Lin Yang |
GISL: a generalized identity specification language based on XML schema. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA - October 21, 2011, pp. 3-12, 2011, ACM, 978-1-4503-1006-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | W. Michael Petullo, Jon A. Solworth |
Digital identity security architecture in Ethos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA - October 21, 2011, pp. 23-30, 2011, ACM, 978-1-4503-1006-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino |
Privacy preserving identity attribute verification in windows cardspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 13-16, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
31 | Eike Kiltz, Gregory Neven |
Identity-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Identity-Based Cryptography ![In: Identity-Based Cryptography, pp. 31-44, 2009, IOS Press, 978-1-58603-947-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault |
Identity-Based Identification and Signature Schemes using Error Correcting Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Identity-Based Cryptography ![In: Identity-Based Cryptography, pp. 119-134, 2009, IOS Press, 978-1-58603-947-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Antoine Joux |
Introduction to Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Identity-Based Cryptography ![In: Identity-Based Cryptography, pp. 1-12, 2009, IOS Press, 978-1-58603-947-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Kai Rannenberg, Denis Royer |
Open Challenges - Towards the (Not So Distant) Future of Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Future of Identity in the Information Society ![In: The Future of Identity in the Information Society, pp. 391-399, 2009, Springer, 978-3-540-88480-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | James Backhouse, Ruth Halperin |
Approaching Interoperability for Identity Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Future of Identity in the Information Society ![In: The Future of Identity in the Information Society, pp. 245-268, 2009, Springer, 978-3-540-88480-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Denis Royer, André Deuker, Kai Rannenberg |
Mobility and Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Future of Identity in the Information Society ![In: The Future of Identity in the Information Society, pp. 195-242, 2009, Springer, 978-3-540-88480-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Maike Gilliot, Vashek Matyas, Sven Wohlgemuth |
Privacy and Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Future of Identity in the Information Society ![In: The Future of Identity in the Information Society, pp. 351-390, 2009, Springer, 978-3-540-88480-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Bert-Jaap Koops, Zeno J. M. H. Geradts |
Identity-Related Crime and Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Future of Identity in the Information Society ![In: The Future of Identity in the Information Society, pp. 315-347, 2009, Springer, 978-3-540-88480-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Jingwei Huang 0002, David M. Nicol |
A calculus of trust and its application to PKI and identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 23-37, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
semantics of trust, social networks, uncertainty, PKI, risk assessment, identity management, trust modeling |
31 | Markus Bylund, Jussi Karlgren, Fredrik Olsson, Pedro Sanches 0001, Carl-Henrik Arvidsson |
Mirroring your web presence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSM ![In: Proceeding of the 2008 ACM Workshop on Search in Social Media, SSM 2008, Napa Valley, California, USA, October 30, 2008, pp. 87-90, 2008, ACM, 978-1-60558-258-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
computational stylistics, information refinement, privacy, digital identity, social identity, language technology |
31 | Yusuf Pisan |
My guild, my people: role of guilds in massively multiplayer online games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IE ![In: Proceedings of the 4th Australasian Conference on Interactive Entertainment, IE 2007, 3-5 December 2007, Melbourne, Australia, pp. 20, 2007, ACM, 978-1-921166-87-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
group identity, virtual environments, games, digital identity, MMOs |
31 | Mikhail V. Volkov 0001 |
Checking quasi-identities in a finite semigroup may be computationally hard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stud Logica ![In: Stud Logica 78(1-2), pp. 349-356, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
quasi-identity, NP-completeness, identity, semigroup |
31 | Thomas Groß 0001, Birgit Pfitzmann |
Proving a WS-Federation passive requestor profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004, pp. 77-86, 2004, ACM, 1-58113-973-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
WS-federation passive requestor profile, WSFPI, browser-based, security proof of protocols, single signon, security, web browser, web service security, federated identity management, identity federation |
30 | Christian Emig, Frank Brandt, Sebastian Kreuzer, Sebastian Abeck |
Identity as a Service - Towards a Service-Oriented Identity Management Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUNICE ![In: Dependable and Adaptable Networks and Services, 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007, Enschede, The Netherlands, July 18-20, 2007, Proceedings, pp. 1-8, 2007, Springer, 978-3-540-73529-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Douglas Thain |
Identity Boxing: A New Technique for Consistent Global Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the ACM/IEEE SC2005 Conference on High Performance Networking and Computing, November 12-18, 2005, Seattle, WA, USA, CD-Rom, pp. 51, 2005, IEEE Computer Society, 1-59593-061-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Practical ID-based encryption for wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 337-340, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
online/offline encryption, identity-based encryption, wireless sensor network security |
30 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 108-119, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Online/offline signature, Mobile ad hoc networks, identity-based cryptography, multisignature, forgery attack |
30 | Corin Pitcher, James Riely |
Dynamic Policy Discovery with Remote Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FoSSaCS ![In: Foundations of Software Science and Computation Structures, 9th International Conference, FOSSACS 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 25-31, 2006, Proceedings, pp. 111-125, 2006, Springer, 3-540-33045-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
code-identity based access control, policy establishment, Next Generation Secure Computing Base, ?-calculus, key establishment, remote attestation |
30 | Marco Casassa Mont, Robert Thyne |
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 118-134, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy-aware access control, obligation management, privacy, identity management, policy enforcement |
30 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 275-292, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
30 | Philipp Grabher, Dan Page |
Hardware Acceleration of the Tate Pairing in Characteristic Three. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 398-411, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
FPGA, Elliptic Curve, Pairing, Identity Based Encryption |
29 | Vikraman Arvind, Partha Mukhopadhyay |
Derandomizing the Isolation Lemma and Lower Bounds for Circuit Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPROX-RANDOM ![In: Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques, 11th International Workshop, APPROX 2008, and 12th International Workshop, RANDOM 2008, Boston, MA, USA, August 25-27, 2008. Proceedings, pp. 276-289, 2008, Springer, 978-3-540-85362-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Martin Rehák, Michal Pechoucek |
Trust Modeling with Context Representation and Generalized Identities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIA ![In: Cooperative Information Agents XI, 11th International Workshop, CIA 2007, Delft, The Netherlands, September 19-21, 2007, Proceedings, pp. 298-312, 2007, Springer, 978-3-540-75118-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Shaoning Pang, Nikola K. Kasabov |
Investigating LLE Eigenface on Pose and Face Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part II, pp. 134-139, 2006, Springer, 3-540-34437-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Shaohua Kevin Zhou, Volker Krüger, Rama Chellappa |
Face Recognition from Video: A CONDENSATION Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGR ![In: 5th IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2002), with CD-ROM, 20-21 May 2002, Washington, D.C., USA, pp. 221-228, 2002, IEEE Computer Society, 0-7695-1602-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Face Recognition from Video, Time Series State Space Model, Entropy, Sequential Monte Carlo |
29 | Shaohua Kevin Zhou, Rama Chellappa |
Probabilistic Human Recognition from Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV (3) ![In: Computer Vision - ECCV 2002, 7th European Conference on Computer Vision, Copenhagen, Denmark, May 28-31, 2002, Proceedings, Part III, pp. 681-697, 2002, Springer, 3-540-43746-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Lucy Lynch |
Inside the Identity Management Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 15(5), pp. 78-82, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
identity standards, identity management, OpenID, OAuth |
28 | Ivonne Thomas, Christoph Meinel |
An Attribute Assurance Framework to Define and Match Trust in Identity Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2011, Washington, DC, USA, July 4-9, 2011, pp. 580-587, 2011, IEEE Computer Society, 978-1-4577-0842-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Attribute Assurance, Trust, Identity, Identity Federation |
28 | Yang Zhang 0015, Junliang Chen |
Universal Identity Management Model Based on Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2010 IEEE International Conference on Services Computing, SCC 2010, Miami, Florida, USA, July 5-10, 2010, pp. 305-312, 2010, IEEE Computer Society, 978-0-7695-4126-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Privacy Concerns of Service-Oriented Solutions, Identity Metasystem, Privilege Delegation, Identity Management |
28 | Gabriel López 0001, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Joao Girão |
A SWIFT Take on Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 42(5), pp. 58-65, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SWIFT, Privacy, Identity management, SSO, SAML, Security & privacy, Virtual identity |
28 | Farah Layouni, Yann Pollet |
An Ontology-Based Architecture for Federated Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009, pp. 162-166, 2009, IEEE Computer Society, 978-0-7695-3638-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Circle of trust, Identity provider, Ontology, OWL, Service provider, Federated identity |
28 | David W. Chadwick, Kaniz Fatema |
An advanced policy based authorisation infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 81-84, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
application independent pep, credential validation service, master pdp, obligations service, pdp, pep, sticky policy |
28 | Jan Camenisch, Thomas Groß 0001, Thomas S. Heydt-Benjamin |
Rethinking accountable privacy supporting services: extended abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 1-8, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
time capsule, privacy, cryptographic protocols, accountability, verifiable encryption, anonymous credential systems |
28 | Giovanni Di Crescenzo, Munir Cochinwala, Hyong Sop Shim |
Modeling cryptographic properties of voice and voice-based entity authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 53-61, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
modeling human factors, biometrics, voice, entity authentication |
28 | Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas |
A game theoretic model for digital identity and trust in online communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 341-344, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
trust, game theory, online communities, digital identity |
28 | Binaebi Akah, Shaowen Bardzell |
Empowering products: personal identity through the act of appropriation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010, pp. 4021-4026, 2010, ACM, 978-1-60558-930-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
creative freedom, do-it-yourself, personal identity, steampunk, design, materiality, appropriation, craft |
28 | Mihir Bellare, Chanathip Namprempre, Gregory Neven |
Security Proofs for Identity-Based Identification and Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(1), pp. 1-61, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Signatures, Identity-based cryptography, Identification schemes, Security proofs |
28 | Shuigen Yang, Huachun Zhou, Yajuan Qin, Hongke Zhang |
SHIP: Cross-layer mobility management scheme based on Session Initiation Protocol and Host Identity Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 42(1-2), pp. 5-15, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Session initiation protocol, Mobility management, Cross-layer design, Host identity protocol |
28 | Mücahit Mutlugün, Oktay Adalier |
Turkish national electronic identity card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 14-18, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
national identity card, biometrics, smart card, pki |
28 | Christian Schridde, Matthew Smith 0001, Bernd Freisleben |
TrueIP: prevention of IP spoofing attacks using identity-based cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 128-137, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, denial-of-service, signatures, identity-based cryptography, IP spoofing |
28 | Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda |
All your contacts are belong to us: automated identity theft attacks on social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 551-560, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
social network security, identity theft |
28 | Jun Hu, Liam Peyton |
Integrating Identity Management With Federated Healthcare Data Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCETECH ![In: E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings, pp. 100-112, 2009, Springer, 978-3-642-01186-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Federated data model, record linking, data consolidation, health care data, privacy, identity |
28 | Hongwei Li 0001, Yuanshun Dai, Ling Tian, Haomiao Yang |
Identity-Based Authentication for Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudCom ![In: Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings, pp. 157-166, 2009, Springer, 978-3-642-10664-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication, cloud computing, identity-based cryptography |
28 | Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi |
Efficient identity-based authentication for IMS based services access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 260-266, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
identity based cryptography (IBC), personalized access, service authentication, IP multimedia subsystem (IMS) |
28 | Amy L. Gonzales, Thomas Finley, Stuart Paul Duncan |
(Perceived) interactivity: does interactivity increase enjoyment and creative identity in artistic spaces? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 415-418, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
music installation, user enjoyment, creativity, identity, interactive art |
28 | László Bokor, Szabolcs Nováczki, László Tamás Zeke, Gábor Jeney |
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2009, Tenerife, Canary Islands, Spain, October 26-19, 2009, pp. 124-133, 2009, ACM, 978-1-60558-616-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
INET, handover performance, real-life hip testbed, C++, OMNeT++, simulation framework, host identity protocol (HIP), protocol simulation |
28 | Lei Zhang 0009, Qianhong Wu, Bo Qin |
Identity-Based Verifiably Encrypted Signatures without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 76-89, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature |
28 | Benoît Libert, Damien Vergnaud |
Adaptive-ID Secure Revocable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 1-15, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
provable security, revocation, Identity-based encryption |
28 | Vipul Goyal, Steve Lu 0001, Amit Sahai, Brent Waters |
Black-box accountable authority identity-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 427-436, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
accountable authority, identity-based encryption |
28 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar |
Identity-based encryption with efficient revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 417-426, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provable security, revocation, identity-based encryption |
28 | Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee 0001 |
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 373-380, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multi-receiver identity-based key encapsulation |
28 | Denis Royer |
Assessing the Value of Enterprise Identity Management (EIdM) - Towards a Generic Evaluation Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 779-786, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IT Security Investments, Enterprise Identity Management (EIdM), Decision Support, Balanced Scorecard, Cost/Benefit Analysis |
28 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings, pp. 354-375, 2008, Springer, 978-3-540-85503-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multi-TA IBE, multiple trusted authorities, anonymity, identity-based encryption |
28 | Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang |
Traceable and Retrievable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 94-110, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PKG, Trust, Retrievability, Traceability, Identity-based Encryption |
28 | Ping Dong, Hongchao Wang, Hongke Zhang |
An efficient approach to map identity onto locator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 90, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mapping, locator, identity |
28 | Anna Cinzia Squicciarini, Alexei Czeskis, Abhilasha Bhargav-Spantzel |
Privacy policies compliance across digital identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings, pp. 72-81, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, tracing, digital identity |
28 | Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 185-198, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Identity-Based Encryption, Proxy re-encryption, Personal Health Record |
28 | Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang |
Protecting the Publishing Identity in Multiple Tuples. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 205-218, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Identity, Privacy preservation, Data publishing |
28 | Junichi Kanebako, Atsuhito Sekiguchi |
Vibracion Cajon: a drumming interface that awakes a shared sense of identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Computer Entertainment Technology ![In: Proceedings of the International Conference on Advances in Computer Entertainment Technology, ACE 2008, Yokohama, Japan, December 3-5, 2008, pp. 429, 2008, ACM, 978-1-60558-393-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
drumming interface, groove, shared identity, telexistence, haptic, tangible, session, rhythm, Kansei, intuitive interaction |
28 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 1-19, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability |
28 | Diego Blanco-Moreno, Jorge J. Gómez-Sanz, Juan Pavón |
Social Identity Management in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCAI ![In: International Symposium on Distributed Computing and Artificial Intelligence, DCAI 2008, University of Salamanca, Spain, 22th-24th October 2008, pp. 62-70, 2008, Springer, 978-3-540-85862-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
social network identity, privacy, Social networks |
28 | Joonsang Baek, Willy Susilo, Jianying Zhou 0001 |
New constructions of fuzzy identity-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 368-370, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
efficient constructions, fuzzy identity-based encryption |
28 | Tjaart Steyn, Hennie A. Kruger, Lynette Drevin |
Identity Theft - Empirical evidence from a Phishing Exercise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 193-203, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
phising, education, Identity theft, security awareness |
28 | Yide Shen |
Transactive memory system development in virtual teams: the potential role of shared identity and shared context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPR ![In: Proceedings of the 2007 ACM SIGMIS CPR Conference on Computer Personnel Research 2007, April 19-21, 2007, St. Louis, Missouri, USA, pp. 228-230, 2007, ACM, 978-1-59593-641-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
shared identity, transactive memory system, virtual team, shared context |
28 | Matthew Green 0001, Giuseppe Ateniese |
Identity-Based Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 288-306, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
identity-based encryption, bilinear maps, proxy re-encryption |
28 | Guomin Yang, Jing Chen 0001, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang 0002 |
A More Natural Way to Construct Identity-Based Identification Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 307-322, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Concurrent attacks, Identity-based cryptography, Identification schemes |
28 | Latanya Sweeney |
Protecting Job Seekers from Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(2), pp. 74-78, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
phishing, google, identity theft |
28 | Daniel J. Weitzner |
In Search of Manageable Identity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(6), pp. 84-86, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
credit card authorization systems, identity management, Internet security |
Displaying result #301 - #400 of 14619 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|