The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for identity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1947-1973 (17) 1974-1977 (20) 1978-1980 (15) 1981-1983 (20) 1984 (15) 1985-1986 (19) 1987-1988 (39) 1989 (37) 1990 (37) 1991 (30) 1992 (26) 1993 (32) 1994 (38) 1995 (37) 1996 (43) 1997 (55) 1998 (54) 1999 (93) 2000 (101) 2001 (143) 2002 (186) 2003 (279) 2004 (395) 2005 (600) 2006 (691) 2007 (806) 2008 (793) 2009 (794) 2010 (499) 2011 (572) 2012 (458) 2013 (516) 2014 (559) 2015 (520) 2016 (528) 2017 (595) 2018 (623) 2019 (767) 2020 (808) 2021 (868) 2022 (794) 2023 (888) 2024 (209)
Publication types (Num. hits)
article(6043) book(16) data(4) incollection(190) inproceedings(8179) phdthesis(130) proceedings(57)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5224 occurrences of 2354 keywords

Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li Identity-Based Key-Insulated Signature with Secure Key-Updates. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure
28Jan Camenisch, Thomas Gross 0001, Dieter Sommer Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XML signature standard, verifiable random function, security, privacy, WS-security, federated identity management
28Craig Gentry Practical Identity-Based Encryption Without Random Oracles. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Identity Based Encryption
28Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure
28Sanjit Chatterjee, Palash Sarkar 0001 Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-receiver encryption, bilinear pairing, identity based encryption
28Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto Universally Composable Identity-Based Encryption. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IND-ID-CCA2, universal composition, identity-based encryption
28Fan Zhang, Dengguo Feng Identity-based PKI Scheme for Machine Readable Travel Document. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MRTD, PKD, DSI, DSPK, PKI, Identity-based signature
28Marco Casassa Mont, Robert Thyne Privacy policy enforcement in enterprises with identity management solutions. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, access control, identity management, policy enforcement
28Maaria Nuutinen Expert Identity construct in analysing prerequisites for expertise development: a case study of nuclear power plant operators' on-the-job training. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Expert Identity, Emotions, Process control, Nuclear power plant, Work analysis, On-the-job training
28Martin Gaedke, Johannes Meinecke, Martin Nussbaumer A modeling approach to federated identity and access management. Search on Bibsonomy WWW (Special interest tracks and posters) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identity and access management, security, reuse, federation
28Xiaoqin Huang, Lin Chen 0020, Linpeng Huang, Minglu Li 0001 An Identity-Based Model for Grid Security Infrastructure. Search on Bibsonomy ISSADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Identity Cryptography, Grid Security Infrastructure, Secure Group Communication
28Dan Boneh, Jonathan Katz Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public-key encryption, Identity-based encryption, Chosen-ciphertext security
28Zeev Dvir, Amir Shpilka Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF depth 3 circuits, locally decodable codes, polynomial identity testing
28Sherman S. M. Chow, Willy Susilo Generic Construction of (Identity-Based) Perfect Concurrent Signatures. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Perfect Ambiguity, Bilinear Pairing, Fair-Exchange, Ring Signatures, Identity-based Signatures, Concurrent Signatures
28Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu Identity Based Threshold Ring Signature. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature
28Swee-Huay Heng, Kaoru Kurosawa k-Resilient Identity-Based Encryption in the Standard Model. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption
28Valentine Kabanets, Russell Impagliazzo Derandomizing polynomial identity tests means proving circuit lower bounds. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF BPP, NEXP, circuit lower bounds, derandomization, polynomial identity testing
28Lauge Baungaard Rasmussen Identity Building in Organisations: Proactive Capability Development. Search on Bibsonomy AI Soc. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Identity building, Proactive capabilities, Routine reflection, Scenario method, Creativity, Organisation, Conflict management
28Rich Ling "We Release Them Little by Little": Maturation and Gender Identity as Seen in the Use of Mobile Telephony. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Youth, Identity, Mobile telephony
28Shahrokh Saeednia, Reihaneh Safavi-Naini Efficient Identity-Based Conference Key Distribution Protocols. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Security classes, Identity-based, Conference key
27Matthew Rowe 0001 Applying Semantic Social Graphs to Disambiguate Identity References. Search on Bibsonomy ESWC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Feng Zhu 0010, Wei Zhu RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments. Search on Bibsonomy PerCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Chuiwei Lu Detection and Defense of Identity Attacks in P2P Network. Search on Bibsonomy ISICA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Identify attack, Intrusion detection, Network security, P2P
27Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh Identity-based secure protocol scheme for wireless sensor network. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ID-based authentication, clustering, wireless sensor network, authentication, proxy
27Ming-Hour Yang, Jain-Shing Wu, Shih-Jen Chen Protect mobile RFID location privacy using dynamic identity. Search on Bibsonomy IEEE ICCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Milena Yankova, Horacio Saggion, Hamish Cunningham Adopting ontologies for multisource identity resolution. Search on Bibsonomy OBI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Gang Yao, Hongji Wang, Qingshan Jiang An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Shanqing Guo, Chunhua Zhang Identity-based Broadcast Encryption Scheme with Untrusted PKG. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Zhi Guan, Huiping Sun, Zhong Chen 0001, Xianghao Nan Efficient Identity-Based Key Issue with TPM. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Chenxi Zhang, Rongxing Lu, Xiaodong Lin 0001, Pin-Han Ho, Xuemin Shen An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Alcides Castro-e-Silva, Gerald Weber, Romuel F. Machado, Elizabeth F. Wanner, Renata Guerra-Sá Identity Transposon Networks in D. melanogaster. Search on Bibsonomy BSB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Stephen Wilson Public key superstructure "it's PKI Jim, but not as we know it!". Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, PKI, public key infrastructure, digital certificates
27Mandana Vaziri, Frank Tip, Stephen Fink, Julian Dolby Declarative Object Identity Using Relation Types. Search on Bibsonomy ECOOP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Chaorong Peng, Chang Wen Chen A New Network Layer for Mobile Ad Hoc Wireless Networks Based on Assignment Router Identity Protocol. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Hoon Wei Lim, Kenneth G. Paterson Multi-key Hierarchical Identity-Based Signatures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Michel Abdalla, Eike Kiltz, Gregory Neven Generalized Key Delegation for Hierarchical Identity-Based Encryption. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Rajeev Gupta, Shourya Roy, Manish Bhide Identity Delegation in Policy Based Systems. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Rodrigo Lopes, Dongwan Shin Controlled sharing of identity attributes for better privacy. Search on Bibsonomy CollaborateCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Vipul Goyal Reducing Trust in the PKG in Identity Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Sabine Delaître Risk Management approach on identity theft in biometric systems context. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Liang Li, Jie Tian 0001, Xin Yang 0001 A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Clifton Phua, Vincent C. S. Lee, Ross W. Gayler, Kate A. Smith Temporal Representation in Spike Detection of Sparse Personal Identity Streams. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Christian Veigner, Chunming Rong On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27G. Alan Wang, Hsinchun Chen, Homa Atabakhsh A Multi-layer Naïve Bayes Model for Approximate Identity Matching. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27R. J. Hulsebosch, Mortaza S. Bargh, P. H. Fennema, J. F. Zandbelt, Martin Snijders, E. H. Eertink Using Identity Management and Secure DNS for Effective and Trusted User Controlled Light-Path Establishment. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jin Wang, Jia Yu 0005, Daxing Li, Xi Bai 0002, Zhongtian Jia Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Hoon Wei Lim, Kenneth G. Paterson Identity-Based Cryptography for Grid Security. Search on Bibsonomy e-Science The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Alan N. Martin, Gregory M. P. O'Hare, Brian R. Duffy, Bianca Schön, John F. Bradley Maintaining the Identity of Dynamically Embodied Agents. Search on Bibsonomy IVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Rita Sharma, David Poole 0001 Probability and Equality: A Probabilistic Model of Identity Uncertainty. Search on Bibsonomy Canadian AI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Changgen Peng, Xiang Li An Identity-Based Threshold Signcryption Scheme with Semantic Security. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Gail-Joon Ahn, Dongwan Shin, Seng-Phil Hong Information Assurance in Federated Identity Management: Experimentations and Issues. Search on Bibsonomy WISE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Sarit Mukherjee, Sampath Rangarajan, John Lin, Sanjoy Paul User Identity Based Session Redirection in CDMA2000 Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Dae Hyun Yum, Pil Joong Lee Identity-Based Cryptography in Public Key Management. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Willy Susilo, Fangguo Zhang, Yi Mu 0001 Identity-Based Strong Designated Verifier Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Arun Ross, Anil K. Jain 0001 Biometrics: When Identity Matters. Search on Bibsonomy SINOBIOMETRICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin Identity-Based Zero Knowledge. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Nwe Ni Tun, Satoshi Tojo Inheritance of Multiple Identity Conditions in Order-Sorted Logic. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27David R. Millen, John F. Patterson Identity disclosure and the creation of social capital. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2003 DBLP  DOI  BibTeX  RDF virtual community and community computing, computer mediated communication, social computing and social navigation
27Anantharaman Lakshminarayanan, Jianying Zhou 0001 FlexiCert: Merging X.509 Identity Certificates and Attribute Certificates. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Sergio Marti, Hector Garcia-Molina Identity Crisis: Anonymity vs. Reputation in P2P Systems. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Matthias Baaz, Christian G. Fermüller A Note on the Proof-Theoretic Strength of a Single Application of the Schema of Identity. Search on Bibsonomy Proof Theory in Computer Science The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27S. Ben-Yacoub, Yousri Abdeljaoued, E. Mayoraz Fusion of face and speech data for person identity verification. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27William Aiello, Sachin Lodha, Rafail Ostrovsky Fast Digital Identity Revocation (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF signatures, public-key infrastructure, certificate revocation, digital identities, Certificate authority
27Frank Eliassen, Randi Karlsen Interoperability and Object Identity. Search on Bibsonomy SIGMOD Rec. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
27Gustavus J. Simmons, George B. Purdy Zero-Knowledge Proofs of Identity And Veracity of Transaction Receipts. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
25Sarbari Gupta Personal identity verification (PIV) cards as federated identities: challenges and opportunities. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance
25Eve Maler, Drummond Reed The Venn of Identity: Options and Issues in Federated Identity Management. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Konstantin Hyppönen An Open Mobile Identity Tool: An Architecture for Mobile Identity Management. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Ben A. M. Schouten, Massimo Tistarelli, Carmen García-Mateo, Farzin Deravi, Martin Meints Nineteen Urgent Research Topics in Biometrics and Identity Management. Search on Bibsonomy BIOID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Liang Li, Wei-Qiang Jiang, Jie Tian 0001, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang 0001 A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Soichi Kozai A Mental Space Account for Speaker's Empathy: Japanese Profiling Identity vs. English Shading Identity. Search on Bibsonomy CONTEXT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
25Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai A generic construction of useful client puzzles. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity based KEM, security notions, useful client puzzle
25M. Eric Johnson Data Hemorrhages in the Health-Care Sector. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Health-care information, data leaks, security, identity theft
25Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
25Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anonymity, Identity-based encryption, Random-oracle model, Foundations, Searchable encryption
25R. J. Hulsebosch, P. W. G. Ebben Enhancing Face Recognition with Location Information. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, face recognition, Context, sensor fusion, identity verification
25Darren J. Reed, Geraldine Fitzpatrick Acting Your Age in Second Life. Search on Bibsonomy Fun and Games The full citation details ... 2008 DBLP  DOI  BibTeX  RDF age-identity, performativity, play, Second life, older users
25Zeev Dvir, Amir Shpilka, Amir Yehudayoff Hardness-randomness tradeoffs for bounded depth arithmetic circuits. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bounded depth circuits, hardness-randomness tradeoffs, identity testing, lower bounds, arithmetic circuits
25Ramaswamy Chandramouli Policy Specification and Enforcement for Smart ID Cards Deployment. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF XML, Smart Cards, XSLT, Identity Management
25Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek Concurrently-secure credential ownership proofs. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity-based cryptography, signature schemes, identification schemes, credential systems, designated-verifier signatures
25Dan Page, Frederik Vercauteren A Fault Attack on Pairing-Based Cryptography. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, identity based encryption, fault attack, Tate pairing
25Jaeki Song, Yong Jin Kim Social influence process in the acceptance of a virtual community service. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Subjective norms, Social comparison, Avatar, Social identity
25Kayvan M. Lavassani, Bahar Movahedi, Vinod Kumar 0001 Identification in electronic networks: characteristics of e-identifiers. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic identification, electronic identifier, electronic networks, e-commerce, identity theft
25Jin Li 0002, Fangguo Zhang, Yanming Wang A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key encryption, Identity based, Bilinear groups
25He Ge An Anonymous Authentication Scheme for Identification Card. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Anonymous Identification, Privacy, Cryptographic Protocol, Identity Management, Group Signature
25Dickson K. W. Chiu, Changjie Wang, Ho-fung Leung, Irene Kafeza, Eleanna Kafeza Supporting the legal identities of contracting agents with an agent authorization platform. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF agent certificate, legal identity, intelligent agents, authorization, PKI, e-contract
25John Sören Pettersson, Simone Fischer-Hübner, Ninni Danielsson, Jenny Nilsson, Mike Bergmann, Sebastian Clauß, Thomas Kriegelstein, Henry Krasemann Making PRIME usable. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF HCI, identity management, privacy-enhancing technologies
25Zhenfeng Zhang, Dengguo Feng, Jing Xu 0002, Yongbin Zhou Efficient ID-Based Optimistic Fair Exchange with Provable Security. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Provable Security, Fair exchange, Identity-based Signature
25Markus Rohde, Leonard Reinecke, Bernd Pape, Monique Janneck Community-Building with Web-Based Systems - Investigating a Hybrid Community of Students. Search on Bibsonomy Comput. Support. Cooperative Work. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CommSy, communities of practice (COP), e-community-building, hybrid and self-organized community of students, qualitative interviews, social identity theory (SIT)
25Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Signature. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public-key signature, identity-based signature, Certificateless signature
25Heikki Ailisto, Mikko Lindholm, Satu-Marja Mäkelä, Elena Vildjiounaite Unobtrusive user identification with light biometrics. Search on Bibsonomy NordiCHI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF body fat percentage, privacy, verification, biometrics, identification, weight, identity theft, height
25Kenji Imamoto, Kouichi Sakurai Key-Exchange Protocol Using Pre-agreed Session-ID. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Diffie-Hellman based key exchange protocol, Identity concealment, Pre-shared key model, Pre-Agreed Session ID
25Dae Hyun Yum, Pil Joong Lee Efficient Key Updating Signature Schemes Based on IBS. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key insulated signature, intrusion resilient siganture, identity based signature
24Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon The User-Centric Vision Matches Credentials Exchanges. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Anis Chaari, Sylvie Lelandais, Mohamed Ben Ahmed A Pruning Approach Improving Face Identification Systems. Search on Bibsonomy AVSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Lin Chen 0020, Xiaoqin Huang, Jinyuan You Certificate-Based Authentication and Authorization Architecture in Digital Library. Search on Bibsonomy ICADL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Jaewon Shin, Leonidas J. Guibas, Feng Zhao 0001 A Distributed Algorithm for Managing Multi-target Identities in Wireless Ad-hoc Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Rafael Accorsi Automated Privacy Audits to Complement the Notion of Control for Identity Management. Search on Bibsonomy IDMAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Vasu S. Alagar, Kaiyu Wan Context Based Enforcement of Authorization for Privacy and Security in Identity Management. Search on Bibsonomy IDMAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Gus Hosein Keynote Paper: Politics and Identity Management. Search on Bibsonomy IDMAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 14619 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license