|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5224 occurrences of 2354 keywords
|
|
|
Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Shintaro Mizuno, Kohji Yamada, Kenji Takahashi |
Authentication using multiple communication channels. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
internet, authentication, mobile phone, multiple channels |
23 | Basit Shafiq, Elisa Bertino, Arif Ghafoor |
Access control management in a distributed environment supporting dynamic collaboration. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
GTRBAC, collaboration, access control, trust management |
23 | Chou Chen Yang, Hung-Wen Yang, Hui-Chuan Huang |
A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
impersonate destination node attacks, packet forgery attacks, ad hoc networks, elliptic curve cryptography, hash chains, collision attacks, identity-based cryptosystem |
23 | Frank Schell, Andreas Schaf, Jochen Dinger, Hannes Hartenstein |
Assessing identity and access management systems based on domain-specific performance evaluation. |
WOSP/SIPEW |
2010 |
DBLP DOI BibTeX RDF |
identity and access management, simulation, performance evaluation |
23 | Elizabeth Barnes |
Indeterminacy, identity and counterparts: Evans reconsidered. |
Synth. |
2009 |
DBLP DOI BibTeX RDF |
Vague identity, Ontic vagueness, Counterpart theory, Indeterminacy |
23 | Walid Karam, Chafic Mokbel, Hanna Greige, Gérard Chollet |
Audio-Visual Identity Verification and Robustness to Imposture. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
audio-visual forgery, talking-face imposture, biometric verification robustness, Identity verification, face animation, voice conversion |
23 | Jung Yeon Hwang, Dong Hoon Lee 0001, Moti Yung |
Universal forgery of the identity-based sequential aggregate signature scheme. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
sequential aggregate signature, universal forgery, identity-based cryptography |
23 | Di Ma, Xiaodong Li, Wei Wang 0083, Wei Mao |
An application of host identity tags to DKIM for identifying signers. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
DKIM (DomainKeys Identified Mail), HIT (Host Identity Tag), identification, DNS |
23 | Gulsum Zeynep Gurkas Aydin, Hakima Chaouchi, Abdul Halim Zaim |
eHIP: early update for Host Identity Protocol. |
Mobility Conference |
2009 |
DBLP DOI BibTeX RDF |
early HIP, early update, handover latency, handover, anticipation, HIP, micro mobility, Host Identity Protocol |
23 | Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov |
A case study of enterprise identity management system adoption in an insurance organization. |
CHIMIT |
2009 |
DBLP DOI BibTeX RDF |
case study, identity management, qualitative research, organizational factors, security tools |
23 | Grant A. Partridge, Pourang P. Irani |
IdenTTop: a flexible platform for exploring identity-enabled surfaces. |
CHI Extended Abstracts |
2009 |
DBLP DOI BibTeX RDF |
identity-enabled surfaces, multi-touch, tabletops |
23 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
23 | Georg Aichholzer, Stefan Strauß |
Understanding a complex innovation process: identity management in Austrian e-government. |
D.GO |
2009 |
DBLP BibTeX RDF |
electronic identity, privacy, e-government, process, innovation |
23 | S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan |
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
Multiple Receivers, Provable Security, Signcryption, Identity-Based Cryptography |
23 | S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan |
Identity Based Aggregate Signcryption Schemes. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography |
23 | Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 |
Server-Controlled Identity-Based Authenticated Key Exchange. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Key Exchange, Identity-based Cryptography |
23 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography |
23 | Khaled Masmoudi, Hossam Afifi |
Building identity-based security associations for provider-provisioned virtual private networks. |
Telecommun. Syst. |
2008 |
DBLP DOI BibTeX RDF |
IPsec security associations, Internet key exchange protocol, Provider-provisioned VPNs, Applied identity-based cryptography |
23 | Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi |
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
standard model, identity-based cryptography, identification scheme |
23 | Mahabir Prasad Jhanwar, Rana Barua |
A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Quadratic Residuosity Assumption, Pairing Map, IND-ID-CPA, Identity Based Encryption |
23 | Yongquan Cai, Xiuying Li |
Identity-Based Conference Key Distribution Scheme Using Sealed Lock. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Sealed Lock, Anonymity, Identity-based, Conference Key |
23 | Yeonjung Kang, Haeryong Park, Kilsoo Chun, Junghwan Song |
A Digital Identity Management Service Model. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
IDSP, DIMM, User, Identity Management, SP |
23 | Nicola Venditti, Ovidiu Constantin |
Engineering the Complexity: The State of the Art of Identity and Access Management through the Lens of a Case Study. |
DEXA Workshops |
2008 |
DBLP DOI BibTeX RDF |
Identity Management, Provisioning, Access Management |
23 | Jean Penny |
Amplified Breath - (Dis)Embodied Habitat: Exploring Sonic Interfaces of Performance, Electronics, Space and Flautist Identity. |
CMMR |
2008 |
DBLP DOI BibTeX RDF |
flute, performance, identity, space, electronics |
23 | Alex Meredith, Mark Griffiths 0001, Monica T. Whitty |
Identity in massively multiplayer online games: a qualitative pilot study. |
iiWAS |
2008 |
DBLP DOI BibTeX RDF |
massively multiplayer online games (MMOs), identity, qualitative, self-presentation |
23 | Chiu C. Tan 0001, Haodong Wang, Sheng Zhong 0002, Qun Li 0001 |
Body sensor network security: an identity-based cryptography approach. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
security, body sensor networks, identity-based cryptography |
23 | Ludwig Fuchs, Anton Preis |
BusiROLE: A Model for Integrating Business Roles into Identity Management. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
Business Roles, Identity Management, Compliance, IT security |
23 | Emilio Mordini |
Nothing to Hide Biometrics, Privacy and Private Sphere. |
BIOID |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Biometrics, Recognition, Identity |
23 | Liqun Chen 0002, Zhaohui Cheng, Nigel P. Smart |
Identity-based key agreement protocols from pairings. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Identity based Crytography, Pairings |
23 | Daniel J. Weitzner |
Whose Name Is It, Anyway? Decentralized Identity Systems on the Web. |
IEEE Internet Comput. |
2007 |
DBLP DOI BibTeX RDF |
Web identity, decentralized identification protocols, uniform resource identifiers, URI |
23 | Jean-Yves Béziau |
Sentence, proposition and identity. |
Synth. |
2007 |
DBLP DOI BibTeX RDF |
Language, Identity, Syntax, Congruence, Formula, Sentence, Proposition |
23 | Jiejun Kong, Xiaoyan Hong, Mario Gerla |
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks. |
IEEE Trans. Mob. Comput. |
2007 |
DBLP DOI BibTeX RDF |
identity-free routing, negligibility, network complexity theory, ad hoc network, Anonymity |
23 | Iris A. Junglas, Norman A. Johnson, Douglas J. Steel, Chon Abraham, Paul Mac Loughlin |
Identity formation, learning styles and trust in virtual worlds. |
Data Base |
2007 |
DBLP DOI BibTeX RDF |
identity formation, social laboratories, trust, virtual world, learning style |
23 | Son Thanh Nguyen, Chunming Rong |
Electronic Payment Scheme Using Identity-Based Cryptography. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
electronic wallet, Identity-based cryptography |
23 | Nobuaki Minematsu, Kyoko Sakuraba |
Development of a Femininity Estimator for Voice Therapy of Gender Identity Disorder Clients. |
Speaker Classification (2) |
2007 |
DBLP DOI BibTeX RDF |
Gender identity disorder, femininity, voice therapy, vocal tract shape, GMM, speaker verification, fundamental frequency |
23 | Steven Gevers, Kristof Verslype, Bart De Decker |
Enhancing privacy in identity management systems. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
microsoft cardspace, private credentials, security, privacy, identity managment systems |
23 | Toshihiko Matsuo |
Proxy Re-encryption Systems for Identity-Based Encryption. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
proxy re-encryption system, public key encryption, identity-based encryption |
23 | Benjamin M. Gross, Elizabeth F. Churchill |
Addressing constraints: multiple usernames task spillage and notions of identity. |
CHI Extended Abstracts |
2007 |
DBLP DOI BibTeX RDF |
interview study, usernames, collaboration, instant messaging, email, identity, task, identifier |
23 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Based Proxy Re-encryption Without Random Oracles. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption, Proxy re-encryption |
23 | Sherman S. M. Chow, Kim-Kwang Raymond Choo |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
reveal query, anonymity, provable security, Key agreement, identity-based cryptography |
23 | Zhu Wang, Huiyan Chen |
A Practical Identity-Based Signature Scheme from Bilinear Map. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
ID reduction, bilinear map, Identity-based signature, message recovery |
23 | Ford-Long Wong, Hoon Wei Lim |
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
Inter-domain authentication, secret public key, password, identity-based cryptography |
23 | E-yong Kim, Klara Nahrstedt, Li Xiao 0003, Kunsoo Park |
Identity-based registry for secure interdomain routing. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
authorized search, identity-based registry, verifiable search |
23 | Yiqun Chen, Willy Susilo, Yi Mu 0001 |
Identity-based anonymous designated ring signatures. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
security, ad-hoc networks, peer-to-peer, anonymity, ring signature, identity-based |
23 | Hsinchun Chen, Homa Atabakhsh, Alan Gang Wang, Siddharth Kaza, Chunju Tseng, Yuan Wang, Shailesh Joshi, Tim Petersen, Chuck Violette |
COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
border safety, identity matching, naïve bayes model, data mining, semi-supervised learning, mutual information, law enforcement, homeland security, intelligence and security informatics |
23 | Xavier Boyen, Qixiang Mei, Brent Waters |
Direct chosen ciphertext security from identity-based techniques. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
identity-based encryption, chosen ciphertext security |
23 | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Ring Signature: Why, How and What Next. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
spontaneous anonymous group signature, bilinear pairings, PKI, Identity based cryptography, ring signature |
23 | Thomas Bieger, Pietro Beritelli, Robert Weinert, Andreas Wittmer |
Building Trust and Identity on the Web - New IT Transaction Platforms to Overcome Psychological Barriers to Rent. |
ENTER |
2005 |
DBLP DOI BibTeX RDF |
second-home market, rental business, trust, identity, web-platforms |
23 | Wesley Shumar, Craig Bach |
Negotiating identity in the math forum's online mentoring project. |
JCDL |
2005 |
DBLP DOI BibTeX RDF |
identity, mentoring, mathematics education |
23 | Manindra Agrawal, Somenath Biswas |
Primality and identity testing via Chinese remaindering. |
J. ACM |
2003 |
DBLP DOI BibTeX RDF |
Primality testing, polynomial identity testing |
23 | Bill McCarty |
Automated Identity Theft. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
23 | Song Han 0004, Winson K. Y. Yeung, Jie Wang 0038 |
Identity-based confirmer signatures from pairings over elliptic curves. |
EC |
2003 |
DBLP DOI BibTeX RDF |
elliptic curve discrete logarithms, identity-based signatures, Weil pairing, computational Diffie-Hellman problem |
23 | Roberta Lamb, Elizabeth J. Davidson |
Social Scientists: Managing Identity in Socio-technical Networks. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
social actor, ICT, identity, web page, socio-technical network |
23 | Manindra Agrawal, Somenath Biswas |
Primality and Identity Testing via Chinese Remaindering. |
FOCS |
1999 |
DBLP DOI BibTeX RDF |
Primality testing, Polynomial identity testing |
23 | Kazuhiko Kato, Takashi Masuda |
Persistent Caching: An Implementation Technique for Complex Objects with Object Identity. |
IEEE Trans. Software Eng. |
1992 |
DBLP DOI BibTeX RDF |
persistent caching, complex object database systems, object identifier, navigation operation, database management systems, buffer storage, file organisation, hashed table, complex objects, update propagation, object identity, implementation technique |
22 | Kristy Elizabeth Boyer, E. Nathan Thomas, Audrey Smith Rorrer, Deonte Cooper, Mladen A. Vouk |
Increasing technical excellence, leadership and commitment of computing students through identity-based mentoring. |
SIGCSE |
2010 |
DBLP DOI BibTeX RDF |
computing pipeline, project-based initiatives, diversity, mentoring, broadening participation |
22 | Tanasai Sucontphunt, Zhigang Deng, Ulrich Neumann |
3D human face identity transfer using deformation gradient. |
SIGGRAPH Posters |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Christopher Staite |
Portable secure identity management for software engineering. |
ICSE (2) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Paul Bell, Igor Potapov |
The Identity Correspondence Problem and Its Applications. |
ISAAC |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Xu An Wang 0001, Xiaoyuan Yang 0002 |
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Guang Xiang, Jason I. Hong |
A hybrid phish detection approach by identity discovery and keywords retrieval. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
information retrieval, named entity recognition, anti-phishing |
22 | Craig Gentry, Shai Halevi |
Hierarchical Identity Based Encryption with Polynomially Many Levels. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Joseph K. Liu, Jianying Zhou 0001 |
An Efficient Identity-Based Online/Offline Encryption Scheme. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Federica Paci, Rodolfo Ferrini, Elisa Bertino |
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. |
ICWS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Regina N. Hebig, Christoph Meinel, Michael Menzel 0001, Ivonne Thomas, Robert Warschofsky |
A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control. |
ICWS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai |
Generic Construction of Stateful Identity Based Encryption. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshinobu Kawabe |
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Florina Almenárez, Patricia Arias, Andrés Marín, Daniel Díaz Sánchez |
Towards dynamic trust establishment for identity federation. |
EATIS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Sebastian Rieger |
User-Centric Identity Management in Heterogeneous Federations. |
ICIW |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar |
Security Usability of Petname Systems. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Rachna Dhamija, Lisa Dusseault |
The Seven Flaws of Identity Management: Usability and Security Challenges. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Mizuho Iwaihara, Kohei Murakami, Gail-Joon Ahn, Masatoshi Yoshikawa |
Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. |
ER |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Ye Ning, Terence Sim |
Smile, you're on identity camera. |
ICPR |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Zhongren Liu, Li Xu 0002, Zhide Chen, Yi Mu 0001, Fuchun Guo |
Hierarchical Identity-Based Online/Offline Encryption. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Faizal Arya Samman, Thomas Hollstein, Manfred Glesner |
Flexible parallel pipeline network-on-chip based on dynamic packet identity management. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Wenbo Zhang, Hongqi Zhang, Bin Zhang 0015, Yan Yang |
An Identity-Based Authentication Model for Multi-domain in Grid Environment. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Malika Izabachène, David Pointcheval |
New Anonymity Notions for Identity-Based Encryption. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Elizabeth Papadopoulou, Sarah McBurney, Nick K. Taylor, M. Howard Williams |
Linking Privacy and User Preferences in the Identity Management for a Pervasive System. |
Web Intelligence |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen |
A content-driven access control system. |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
access control, secret sharing, revocation, inference control, attribute-based encryption |
22 | Anthony W. Hager, D. G. Johnson |
Adjoining an Identity to a Reduced Archimedean f -ring, II: Algebras. |
Appl. Categorical Struct. |
2007 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) Primary 06F20, 13B10, Secondary 18A40, 54H10, 46A40, 54C30, 06F25 |
22 | Pete Bramhall, Marit Hansen, Kai Rannenberg, Thomas Roessler |
User-Centric Identity Management: New Trends in Standardization and Regulation. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Pierre Parrend, Samuel Galice, Stéphane Frénot, Stéphane Ubéda |
Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Evangelos Kotsovinos, Ingo Friese, Martin Kurze, Jörg Heuer |
A Role-Based Architecture for Seamless Identity Management and Effective Task Separation. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Orhan Cetinkaya, Ali Doganaksoy |
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
ID-based Encryption, Pairing |
22 | N. Klingenstein |
Attribute Aggregation and Federated Identity. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart |
Identity-Based Traitor Tracing. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Stephen Herborn, Andreas Huber, Roksana Boreli, Aruna Seneviratne |
Secure Host Identity Delegation for Mobility. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Hyun-Chul Choi, Se-Young Oh |
Facial Identity and Expression Recognition by using Active Appearance Model with Efficient Second Order Minimization and Neural Networks. |
CIRA |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Rupeng Li, Jia Yu 0005, Guowen Li, Daxing Li |
A New Identity-Based Blind Signature Scheme with Batch Verifications. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel |
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Zsolt Kovacshazi, Rolland Vida |
Host Identity Specific Multicast. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Liam Peyton, Chintan Doshi, Pierre Seguin |
An audit trail service to enhance privacy compliance in federated identity management. |
CASCON |
2007 |
DBLP DOI BibTeX RDF |
|
22 | G. A. Wang, H. Chen, J. J. Xu, H. Atabakhsh |
Automatically detecting criminal identity deception: an adaptive detection algorithm. |
IEEE Trans. Syst. Man Cybern. Part A |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Clifton Phua, Ross W. Gayler, Kate Smith-Miles, Vincent C. S. Lee |
Communal Detection of Implicit Personal Identity Streams. |
ICDM Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Pietro Michiardi, Refik Molva |
Identity Based Message Authentication for Dynamic Networks. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Joey J. Lee, Christopher M. Hoadley |
Online Identity as a Leverage Point for Learning in Massively Multiplayer Online Role Playing Games (MMORPGs). |
ICALT |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jun Zhao 0003, Carole A. Goble, Robert Stevens 0001 |
An Identity Crisis in the Life Sciences. |
IPAW |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Kenneth G. Paterson, Jacob C. N. Schuldt |
Efficient Identity-Based Signatures Secure in the Standard Model. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Key-Insulated Signature Without Random Oracles. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
|
|