-
1
-
-
24944578141
-
-
P. Ashley, S. Hada, G. Karjoth, C. Powers and M. Schunter, Enterprise Privacy Authorization Language (EPAL 1.1), 2003.
-
(2003)
Enterprise Privacy Authorization Language (EPAL 1.1)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
2
-
-
0345829056
-
Provisions and obligations in policy rule management
-
C. Bettini, S. Jajodia, X.S. Wang and D. Wijesekera, Provisions and obligations in policy rule management. J. Netw. Syst. Manage. 11(3) (2003), 351-372.
-
(2003)
J. Netw. Syst. Manage
, vol.11
, Issue.3
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
3
-
-
0345829056
-
Provisions and obligations in policy rule management
-
C. Bettini, S. Jajodia, X.S. Wang and D. Wijesekera, Provisions and obligations in policy rule management. J. Netw. Syst. Manage. 11(3) (2003), 351-372.
-
(2003)
J. Netw. Syst. Manage
, vol.11
, Issue.3
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
4
-
-
34249885740
-
Privacy preserving multi-factor authentication with biometrics
-
ACM Press, New York, NY, USA
-
A. Bhargav-Spantzel, A. Squicciarini and E. Bertino, Privacy preserving multi-factor authentication with biometrics, in: DIM'06: Proceedings of the Second ACM Workshop on Digital Identity Management, ACM Press, New York, NY, USA, 2006, pp. 63-72.
-
(2006)
DIM'06: Proceedings of the Second ACM Workshop on Digital Identity Management
, pp. 63-72
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.2
Bertino, E.3
-
6
-
-
34249898231
-
Decentralized trust management
-
Technical Report 96-17, 28
-
M. Blaze, J. Feigenbaum and J. Lacy, Decentralized trust management. Technical Report 96-17, 28, 1996.
-
(1996)
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
7
-
-
85025424440
-
An algebra for composing access control policies
-
P. Bonatti, S. De Capitani di Vimercati and P. Samarati, An algebra for composing access control policies, ACM Trans. Inf. Syst. Secur. 5(1) (2002), 1-35.
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
De Capitani di Vimercati, S.2
Samarati, P.3
-
8
-
-
0003808928
-
-
PhD thesis, Eindhoven Institute of Technology, Eindhoven, The Netherlands
-
S. Brands, Rethinking public key infrastructure and digital certificates - building in privacy, PhD thesis, Eindhoven Institute of Technology, Eindhoven, The Netherlands, 1999.
-
(1999)
Rethinking public key infrastructure and digital certificates - building in privacy
-
-
Brands, S.1
-
9
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press, New York, NY, USA
-
E. Brickell, J. Camenisch and L. Chen, Direct anonymous attestation, in: CCS'04: Proceedings of the 11th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2004, pp. 132-145.
-
(2004)
CCS'04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
10
-
-
34249867824
-
-
J. Camenisch, Protecting (anonymous) credentials with the trusted computing group's trusted platform modules v 1.2, in: Proceedings of the 21st IFIP International Information Security Conference (SEC 2006), 2006.
-
J. Camenisch, Protecting (anonymous) credentials with the trusted computing group's trusted platform modules v 1.2, in: Proceedings of the 21st IFIP International Information Security Conference (SEC 2006), 2006.
-
-
-
-
11
-
-
33749684958
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
3295, IBM Research Division, November
-
J. Camenisch and A. Lysyanskaya, Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, Technical Report Research Report RZ 3295, IBM Research Division, November 2000.
-
(2000)
Technical Report Research Report RZ
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Advances in Cryptology, EUROCRYPT 2001, Birgit Pfitzmann, ed, Springer-Verlag
-
J. Camenisch and A. Lysyanskaya, Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, in: Advances in Cryptology - EUROCRYPT 2001, Birgit Pfitzmann, ed., LNCS, vol. 2045, Springer-Verlag, 2001, pp. 93-118.
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Advances in Cryptology, CRYPTO 2002, Moti Yung, ed, Springer-Verlag
-
J. Camenisch and A. Lysyanskaya, Dynamic accumulators and application to efficient revocation of anonymous credentials, in: Advances in Cryptology - CRYPTO 2002, Moti Yung, ed., LNCS, vol. 2442, Springer-Verlag, 2002, pp. 61-76.
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Advances in Cryptology, CRYPTO 2004, Springer-Verlag
-
J. Camenisch and A. Lysyanskaya, Signature schemes and anonymous credentials from bilinear maps, in: Advances in Cryptology - CRYPTO 2004, LNCS, vol. 3152, Springer-Verlag, 2004, pp. 56-72.
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Advances in Cryptology, CRYPTO 2003, Dan Boneh, ed
-
J. Camenisch and V. Shoup, Practical verifiable encryption and decryption of discrete logarithms, in: Advances in Cryptology - CRYPTO 2003, Dan Boneh, ed., LNCS, 2003.
-
(2003)
LNCS
-
-
Camenisch, J.1
Shoup, V.2
-
19
-
-
85119830099
-
On signatures of knowledge, Cryptology ePrint Archive
-
Report 2006/184
-
M. Chase and A. Lysyanskaya, On signatures of knowledge, Cryptology ePrint Archive, Report 2006/184, 2006. http://eprint.iacr.org/
-
(2006)
-
-
Chase, M.1
Lysyanskaya, A.2
-
23
-
-
34249902370
-
-
European Parliament, Directive 95/46/ec of the European Parliament and the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Officiai Journal of the European Communities, 1995.
-
European Parliament, Directive 95/46/ec of the European Parliament and the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Officiai Journal of the European Communities, 1995.
-
-
-
-
24
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology, CRYPTO '86, A.M. Odlyzko, ed, Springer-Verlag
-
A. Fiat and A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, in: Advances in Cryptology - CRYPTO '86, A.M. Odlyzko, ed., LNCS, vol. 263, Springer-Verlag, 1987, pp. 186-194.
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
25
-
-
0032640841
-
A cooperative approach to support software deployment using the software dock
-
IEEE Computer Society Press, Los Alamitos, CA, USA
-
R.S. Hall, D. Heimbigner and A.L. Wolf, A cooperative approach to support software deployment using the software dock, in: ICSE'99: Proceedings of the 21st International Conference on Software Engineering, IEEE Computer Society Press, Los Alamitos, CA, USA, 1999, pp. 174-183.
-
(1999)
ICSE'99: Proceedings of the 21st International Conference on Software Engineering
, pp. 174-183
-
-
Hall, R.S.1
Heimbigner, D.2
Wolf, A.L.3
-
27
-
-
34249887804
-
-
R. Housley, W. Polk, W. Ford and D. Solo, RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, April 2002. Status: Informational.
-
R. Housley, W. Polk, W. Ford and D. Solo, RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, April 2002. Status: Informational.
-
-
-
-
30
-
-
34249915192
-
-
ISO, Annex C - the RSA public key cryptosystem, in: ISO/IEC 9594-8:1989(E), Part of ISO/IEC X.509 Draft Standard, 1989, no note.
-
ISO, Annex C - the RSA public key cryptosystem, in: ISO/IEC 9594-8:1989(E), Part of ISO/IEC X.509 Draft Standard, 1989, no note.
-
-
-
-
36
-
-
34249897360
-
-
C. Lüer and A. van der Hoek, Jploy: User-centric deployment support in a component platform
-
C. Lüer and A. van der Hoek, Jploy: User-centric deployment support in a component platform.
-
-
-
-
37
-
-
67651053584
-
Pseudonym systems
-
Selected Areas in Cryptography, Howard Heys and Carlisle Adams, eds, Springer-Verlag
-
A. Lysyanskaya, R. Rivest, A. Sahai and S. Wolf, Pseudonym systems, in: Selected Areas in Cryptography, Howard Heys and Carlisle Adams, eds, LNCS, vol. 1758, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1758
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
38
-
-
34249903490
-
-
Microsoft, A technical reference for InfoCard v1.0 in windows, 2005.
-
Microsoft, A technical reference for InfoCard v1.0 in windows, 2005.
-
-
-
-
39
-
-
34547339276
-
-
S.J. Murdoch, Hot or not: Revealing hidden services by their clock skew, in: CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2006, pp. 27-36.
-
S.J. Murdoch, Hot or not: Revealing hidden services by their clock skew, in: CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2006, pp. 27-36.
-
-
-
-
40
-
-
0003508562
-
-
National Institute for Standards and Technology NIST, dss
-
National Institute for Standards and Technology (NIST), Digital signature standard (dss), 2000.
-
(2000)
Digital signature standard
-
-
-
41
-
-
34249889732
-
-
OASIS Standard, Security assertion markup language (SAML) V2.0, 2005.
-
OASIS Standard, Security assertion markup language (SAML) V2.0, 2005.
-
-
-
-
43
-
-
34249909387
-
-
OpenID
-
OpenID, http://openid.net
-
-
-
-
44
-
-
33745883087
-
-
May
-
A. Pfitzmann and M. Hansen, Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology, May 2006.
-
(2006)
Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology
-
-
Pfitzmann, A.1
Hansen, M.2
-
45
-
-
34249904795
-
-
A. Pfitzmann and M. Köhntopp, Anonymity, unobservability, and pseudonymity, a proposal for terminology
-
A. Pfitzmann and M. Köhntopp, Anonymity, unobservability, and pseudonymity - a proposal for terminology.
-
-
-
-
46
-
-
34249889453
-
-
J. Postel, DoD standard Internet Protocol. RFC 760, January 1980. Obsoleted by RFC 791, updated by RFC 777.
-
J. Postel, DoD standard Internet Protocol. RFC 760, January 1980. Obsoleted by RFC 791, updated by RFC 777.
-
-
-
-
49
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
50
-
-
34249882330
-
-
IBM Microsoft RSA VeriSign, Web Services Federation Language WS-Federation, version 1.0. July 8 2003
-
IBM Microsoft RSA VeriSign, Web Services Federation Language (WS-Federation), version 1.0. July 8 2003, http://msdn.microsoft.com/library/ default.asp?urls/library/en-us/dnglobspec/html/wsfederation.asp
-
-
-
|