The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for identity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1947-1973 (17) 1974-1977 (20) 1978-1980 (15) 1981-1983 (20) 1984 (15) 1985-1986 (19) 1987-1988 (39) 1989 (37) 1990 (37) 1991 (30) 1992 (26) 1993 (32) 1994 (38) 1995 (37) 1996 (43) 1997 (55) 1998 (54) 1999 (93) 2000 (101) 2001 (143) 2002 (186) 2003 (279) 2004 (395) 2005 (600) 2006 (691) 2007 (806) 2008 (793) 2009 (794) 2010 (499) 2011 (572) 2012 (458) 2013 (516) 2014 (559) 2015 (520) 2016 (528) 2017 (595) 2018 (623) 2019 (767) 2020 (808) 2021 (868) 2022 (794) 2023 (888) 2024 (209)
Publication types (Num. hits)
article(6043) book(16) data(4) incollection(190) inproceedings(8179) phdthesis(130) proceedings(57)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5224 occurrences of 2354 keywords

Results
Found 14619 publication records. Showing 14619 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Shintaro Mizuno, Kohji Yamada, Kenji Takahashi Authentication using multiple communication channels. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF internet, authentication, mobile phone, multiple channels
23Basit Shafiq, Elisa Bertino, Arif Ghafoor Access control management in a distributed environment supporting dynamic collaboration. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF GTRBAC, collaboration, access control, trust management
23Chou Chen Yang, Hung-Wen Yang, Hui-Chuan Huang A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF impersonate destination node attacks, packet forgery attacks, ad hoc networks, elliptic curve cryptography, hash chains, collision attacks, identity-based cryptosystem
23Frank Schell, Andreas Schaf, Jochen Dinger, Hannes Hartenstein Assessing identity and access management systems based on domain-specific performance evaluation. Search on Bibsonomy WOSP/SIPEW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF identity and access management, simulation, performance evaluation
23Elizabeth Barnes Indeterminacy, identity and counterparts: Evans reconsidered. Search on Bibsonomy Synth. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Vague identity, Ontic vagueness, Counterpart theory, Indeterminacy
23Walid Karam, Chafic Mokbel, Hanna Greige, Gérard Chollet Audio-Visual Identity Verification and Robustness to Imposture. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF audio-visual forgery, talking-face imposture, biometric verification robustness, Identity verification, face animation, voice conversion
23Jung Yeon Hwang, Dong Hoon Lee 0001, Moti Yung Universal forgery of the identity-based sequential aggregate signature scheme. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sequential aggregate signature, universal forgery, identity-based cryptography
23Di Ma, Xiaodong Li, Wei Wang 0083, Wei Mao An application of host identity tags to DKIM for identifying signers. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DKIM (DomainKeys Identified Mail), HIT (Host Identity Tag), identification, DNS
23Gulsum Zeynep Gurkas Aydin, Hakima Chaouchi, Abdul Halim Zaim eHIP: early update for Host Identity Protocol. Search on Bibsonomy Mobility Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF early HIP, early update, handover latency, handover, anticipation, HIP, micro mobility, Host Identity Protocol
23Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov A case study of enterprise identity management system adoption in an insurance organization. Search on Bibsonomy CHIMIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF case study, identity management, qualitative research, organizational factors, security tools
23Grant A. Partridge, Pourang P. Irani IdenTTop: a flexible platform for exploring identity-enabled surfaces. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity-enabled surfaces, multi-touch, tabletops
23Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blind identity-based encryption, public key encryption with keyword search, searchable encryption
23Georg Aichholzer, Stefan Strauß Understanding a complex innovation process: identity management in Austrian e-government. Search on Bibsonomy D.GO The full citation details ... 2009 DBLP  BibTeX  RDF electronic identity, privacy, e-government, process, innovation
23S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multiple Receivers, Provable Security, Signcryption, Identity-Based Cryptography
23S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan Identity Based Aggregate Signcryption Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography
23Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 Server-Controlled Identity-Based Authenticated Key Exchange. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Key Exchange, Identity-based Cryptography
23S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography
23Khaled Masmoudi, Hossam Afifi Building identity-based security associations for provider-provisioned virtual private networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPsec security associations, Internet key exchange protocol, Provider-provisioned VPNs, Applied identity-based cryptography
23Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF standard model, identity-based cryptography, identification scheme
23Mahabir Prasad Jhanwar, Rana Barua A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Quadratic Residuosity Assumption, Pairing Map, IND-ID-CPA, Identity Based Encryption
23Yongquan Cai, Xiuying Li Identity-Based Conference Key Distribution Scheme Using Sealed Lock. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sealed Lock, Anonymity, Identity-based, Conference Key
23Yeonjung Kang, Haeryong Park, Kilsoo Chun, Junghwan Song A Digital Identity Management Service Model. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IDSP, DIMM, User, Identity Management, SP
23Nicola Venditti, Ovidiu Constantin Engineering the Complexity: The State of the Art of Identity and Access Management through the Lens of a Case Study. Search on Bibsonomy DEXA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identity Management, Provisioning, Access Management
23Jean Penny Amplified Breath - (Dis)Embodied Habitat: Exploring Sonic Interfaces of Performance, Electronics, Space and Flautist Identity. Search on Bibsonomy CMMR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF flute, performance, identity, space, electronics
23Alex Meredith, Mark Griffiths 0001, Monica T. Whitty Identity in massively multiplayer online games: a qualitative pilot study. Search on Bibsonomy iiWAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF massively multiplayer online games (MMOs), identity, qualitative, self-presentation
23Chiu C. Tan 0001, Haodong Wang, Sheng Zhong 0002, Qun Li 0001 Body sensor network security: an identity-based cryptography approach. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, body sensor networks, identity-based cryptography
23Ludwig Fuchs, Anton Preis BusiROLE: A Model for Integrating Business Roles into Identity Management. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Business Roles, Identity Management, Compliance, IT security
23Emilio Mordini Nothing to Hide Biometrics, Privacy and Private Sphere. Search on Bibsonomy BIOID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, Biometrics, Recognition, Identity
23Liqun Chen 0002, Zhaohui Cheng, Nigel P. Smart Identity-based key agreement protocols from pairings. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Identity based Crytography, Pairings
23Daniel J. Weitzner Whose Name Is It, Anyway? Decentralized Identity Systems on the Web. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web identity, decentralized identification protocols, uniform resource identifiers, URI
23Jean-Yves Béziau Sentence, proposition and identity. Search on Bibsonomy Synth. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Language, Identity, Syntax, Congruence, Formula, Sentence, Proposition
23Jiejun Kong, Xiaoyan Hong, Mario Gerla An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity-free routing, negligibility, network complexity theory, ad hoc network, Anonymity
23Iris A. Junglas, Norman A. Johnson, Douglas J. Steel, Chon Abraham, Paul Mac Loughlin Identity formation, learning styles and trust in virtual worlds. Search on Bibsonomy Data Base The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity formation, social laboratories, trust, virtual world, learning style
23Son Thanh Nguyen, Chunming Rong Electronic Payment Scheme Using Identity-Based Cryptography. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF electronic wallet, Identity-based cryptography
23Nobuaki Minematsu, Kyoko Sakuraba Development of a Femininity Estimator for Voice Therapy of Gender Identity Disorder Clients. Search on Bibsonomy Speaker Classification (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gender identity disorder, femininity, voice therapy, vocal tract shape, GMM, speaker verification, fundamental frequency
23Steven Gevers, Kristof Verslype, Bart De Decker Enhancing privacy in identity management systems. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF microsoft cardspace, private credentials, security, privacy, identity managment systems
23Toshihiko Matsuo Proxy Re-encryption Systems for Identity-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy re-encryption system, public key encryption, identity-based encryption
23Benjamin M. Gross, Elizabeth F. Churchill Addressing constraints: multiple usernames task spillage and notions of identity. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2007 DBLP  DOI  BibTeX  RDF interview study, usernames, collaboration, instant messaging, email, identity, task, identifier
23Cheng-Kang Chu, Wen-Guey Tzeng Identity-Based Proxy Re-encryption Without Random Oracles. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption, Proxy re-encryption
23Sherman S. M. Chow, Kim-Kwang Raymond Choo Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reveal query, anonymity, provable security, Key agreement, identity-based cryptography
23Zhu Wang, Huiyan Chen A Practical Identity-Based Signature Scheme from Bilinear Map. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID reduction, bilinear map, Identity-based signature, message recovery
23Ford-Long Wong, Hoon Wei Lim Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inter-domain authentication, secret public key, password, identity-based cryptography
23E-yong Kim, Klara Nahrstedt, Li Xiao 0003, Kunsoo Park Identity-based registry for secure interdomain routing. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authorized search, identity-based registry, verifiable search
23Yiqun Chen, Willy Susilo, Yi Mu 0001 Identity-based anonymous designated ring signatures. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, ad-hoc networks, peer-to-peer, anonymity, ring signature, identity-based
23Hsinchun Chen, Homa Atabakhsh, Alan Gang Wang, Siddharth Kaza, Chunju Tseng, Yuan Wang, Shailesh Joshi, Tim Petersen, Chuck Violette COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF border safety, identity matching, naïve bayes model, data mining, semi-supervised learning, mutual information, law enforcement, homeland security, intelligence and security informatics
23Xavier Boyen, Qixiang Mei, Brent Waters Direct chosen ciphertext security from identity-based techniques. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identity-based encryption, chosen ciphertext security
23Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu Identity Based Ring Signature: Why, How and What Next. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF spontaneous anonymous group signature, bilinear pairings, PKI, Identity based cryptography, ring signature
23Thomas Bieger, Pietro Beritelli, Robert Weinert, Andreas Wittmer Building Trust and Identity on the Web - New IT Transaction Platforms to Overcome Psychological Barriers to Rent. Search on Bibsonomy ENTER The full citation details ... 2005 DBLP  DOI  BibTeX  RDF second-home market, rental business, trust, identity, web-platforms
23Wesley Shumar, Craig Bach Negotiating identity in the math forum's online mentoring project. Search on Bibsonomy JCDL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF identity, mentoring, mathematics education
23Manindra Agrawal, Somenath Biswas Primality and identity testing via Chinese remaindering. Search on Bibsonomy J. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Primality testing, polynomial identity testing
23Bill McCarty Automated Identity Theft. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC
23Song Han 0004, Winson K. Y. Yeung, Jie Wang 0038 Identity-based confirmer signatures from pairings over elliptic curves. Search on Bibsonomy EC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF elliptic curve discrete logarithms, identity-based signatures, Weil pairing, computational Diffie-Hellman problem
23Roberta Lamb, Elizabeth J. Davidson Social Scientists: Managing Identity in Socio-technical Networks. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF social actor, ICT, identity, web page, socio-technical network
23Manindra Agrawal, Somenath Biswas Primality and Identity Testing via Chinese Remaindering. Search on Bibsonomy FOCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Primality testing, Polynomial identity testing
23Kazuhiko Kato, Takashi Masuda Persistent Caching: An Implementation Technique for Complex Objects with Object Identity. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF persistent caching, complex object database systems, object identifier, navigation operation, database management systems, buffer storage, file organisation, hashed table, complex objects, update propagation, object identity, implementation technique
22Kristy Elizabeth Boyer, E. Nathan Thomas, Audrey Smith Rorrer, Deonte Cooper, Mladen A. Vouk Increasing technical excellence, leadership and commitment of computing students through identity-based mentoring. Search on Bibsonomy SIGCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF computing pipeline, project-based initiatives, diversity, mentoring, broadening participation
22Tanasai Sucontphunt, Zhigang Deng, Ulrich Neumann 3D human face identity transfer using deformation gradient. Search on Bibsonomy SIGGRAPH Posters The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Christopher Staite Portable secure identity management for software engineering. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Paul Bell, Igor Potapov The Identity Correspondence Problem and Its Applications. Search on Bibsonomy ISAAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Xu An Wang 0001, Xiaoyuan Yang 0002 Proxy Re-encryption Scheme Based on SK Identity Based Encryption. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Guang Xiang, Jason I. Hong A hybrid phish detection approach by identity discovery and keywords retrieval. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information retrieval, named entity recognition, anti-phishing
22Craig Gentry, Shai Halevi Hierarchical Identity Based Encryption with Polynomially Many Levels. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Joseph K. Liu, Jianying Zhou 0001 An Efficient Identity-Based Online/Offline Encryption Scheme. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Federica Paci, Rodolfo Ferrini, Elisa Bertino Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. Search on Bibsonomy ICWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Regina N. Hebig, Christoph Meinel, Michael Menzel 0001, Ivonne Thomas, Robert Warschofsky A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control. Search on Bibsonomy ICWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai Generic Construction of Stateful Identity Based Encryption. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshinobu Kawabe Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Florina Almenárez, Patricia Arias, Andrés Marín, Daniel Díaz Sánchez Towards dynamic trust establishment for identity federation. Search on Bibsonomy EATIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Sebastian Rieger User-Centric Identity Management in Heterogeneous Federations. Search on Bibsonomy ICIW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar Security Usability of Petname Systems. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Rachna Dhamija, Lisa Dusseault The Seven Flaws of Identity Management: Usability and Security Challenges. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Mizuho Iwaihara, Kohei Murakami, Gail-Joon Ahn, Masatoshi Yoshikawa Risk Evaluation for Personal Identity Management Based on Privacy Attribute Ontology. Search on Bibsonomy ER The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ye Ning, Terence Sim Smile, you're on identity camera. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Zhongren Liu, Li Xu 0002, Zhide Chen, Yi Mu 0001, Fuchun Guo Hierarchical Identity-Based Online/Offline Encryption. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Faizal Arya Samman, Thomas Hollstein, Manfred Glesner Flexible parallel pipeline network-on-chip based on dynamic packet identity management. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Wenbo Zhang, Hongqi Zhang, Bin Zhang 0015, Yan Yang An Identity-Based Authentication Model for Multi-domain in Grid Environment. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Malika Izabachène, David Pointcheval New Anonymity Notions for Identity-Based Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Elizabeth Papadopoulou, Sarah McBurney, Nick K. Taylor, M. Howard Williams Linking Privacy and User Preferences in the Identity Management for a Pervasive System. Search on Bibsonomy Web Intelligence The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen A content-driven access control system. Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, secret sharing, revocation, inference control, attribute-based encryption
22Anthony W. Hager, D. G. Johnson Adjoining an Identity to a Reduced Archimedean f -ring, II: Algebras. Search on Bibsonomy Appl. Categorical Struct. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mathematics Subject Classifications (2000) Primary 06F20, 13B10, Secondary 18A40, 54H10, 46A40, 54C30, 06F25
22Pete Bramhall, Marit Hansen, Kai Rannenberg, Thomas Roessler User-Centric Identity Management: New Trends in Standardization and Regulation. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Pierre Parrend, Samuel Galice, Stéphane Frénot, Stéphane Ubéda Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Evangelos Kotsovinos, Ingo Friese, Martin Kurze, Jörg Heuer A Role-Based Architecture for Seamless Identity Management and Effective Task Separation. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Orhan Cetinkaya, Ali Doganaksoy Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Fuchun Guo, Yi Mu 0001, Zhide Chen Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID-based Encryption, Pairing
22N. Klingenstein Attribute Aggregation and Federated Identity. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart Identity-Based Traitor Tracing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Stephen Herborn, Andreas Huber, Roksana Boreli, Aruna Seneviratne Secure Host Identity Delegation for Mobility. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Hyun-Chul Choi, Se-Young Oh Facial Identity and Expression Recognition by using Active Appearance Model with Efficient Second Order Minimization and Neural Networks. Search on Bibsonomy CIRA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Rupeng Li, Jia Yu 0005, Guowen Li, Daxing Li A New Identity-Based Blind Signature Scheme with Batch Verifications. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Zsolt Kovacshazi, Rolland Vida Host Identity Specific Multicast. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Liam Peyton, Chintan Doshi, Pierre Seguin An audit trail service to enhance privacy compliance in federated identity management. Search on Bibsonomy CASCON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22G. A. Wang, H. Chen, J. J. Xu, H. Atabakhsh Automatically detecting criminal identity deception: an adaptive detection algorithm. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Clifton Phua, Ross W. Gayler, Kate Smith-Miles, Vincent C. S. Lee Communal Detection of Implicit Personal Identity Streams. Search on Bibsonomy ICDM Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Pietro Michiardi, Refik Molva Identity Based Message Authentication for Dynamic Networks. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Joey J. Lee, Christopher M. Hoadley Online Identity as a Leverage Point for Learning in Massively Multiplayer Online Role Playing Games (MMORPGs). Search on Bibsonomy ICALT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Jun Zhao 0003, Carole A. Goble, Robert Stevens 0001 An Identity Crisis in the Life Sciences. Search on Bibsonomy IPAW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Kenneth G. Paterson, Jacob C. N. Schuldt Efficient Identity-Based Signatures Secure in the Standard Model. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma Identity-Based Key-Insulated Signature Without Random Oracles. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 14619 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license