-
1
-
-
77958050691
-
-
Introduction to usability, 2005. http://www.usabilityfirst.com/intro/ index.txl.
-
(2005)
Introduction to usability
-
-
-
2
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
ABADI, M., AND NEEDHAM, R. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering 22, 1 (1996), 6-15.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
ABADI, M.1
NEEDHAM, R.2
-
3
-
-
24944578141
-
-
ASHLEY, P., HADA, S., KARJOTH, G., POWERS, C., AND SCHUNTER, M. Enterprise Privacy Authorization Language (EPAL 1.1), 2003.
-
(2003)
Enterprise Privacy Authorization Language (EPAL 1.1)
-
-
ASHLEY, P.1
HADA, S.2
KARJOTH, G.3
POWERS, C.4
SCHUNTER, M.5
-
4
-
-
0345829056
-
Provisions and obligations in policy rule management
-
BETTINI, C., JAJODIA, S., WANG, X. S., AND WIJESEKERA, D. Provisions and obligations in policy rule management. J. Netw. Syst. Manage. 11, 3 (2003), 351-372.
-
(2003)
J. Netw. Syst. Manage
, vol.11
, Issue.3
, pp. 351-372
-
-
BETTINI, C.1
JAJODIA, S.2
WANG, X.S.3
WIJESEKERA, D.4
-
5
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures (position paper)
-
BLAZE, M., FEIGENBAUM, J., AND KEROMYTIS, A. D. KeyNote: Trust management for public-key infrastructures (position paper). Lecture Notes in Computer Science 1550 (1999), 59-63.
-
(1999)
Lecture Notes in Computer Science
, vol.1550
, pp. 59-63
-
-
BLAZE, M.1
FEIGENBAUM, J.2
KEROMYTIS, A.D.3
-
6
-
-
34249898231
-
Decentralized trust management
-
Tech. Rep. 96-17, 28
-
BLAZE, M., FEIGENBAUM, J., AND LACY, J. Decentralized trust management. Tech. Rep. 96-17, 28, 1996.
-
(1996)
-
-
BLAZE, M.1
FEIGENBAUM, J.2
LACY, J.3
-
8
-
-
14844295011
-
Direct anonymous attestation
-
New York, NY, USA, ACM Press, pp
-
BRICKELL, E., CAMENISCH, J., AND CHEN, L. Direct anonymous attestation. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security (New York, NY, USA, 2004), ACM Press, pp. 132-145.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 132-145
-
-
BRICKELL, E.1
CAMENISCH, J.2
CHEN, L.3
-
9
-
-
34547424582
-
-
CAMENISCH, J. Protecting (anonymous) credentials with the trusted computing group's trusted platform modules v.1.2. In Proceedings of the 21st IFIP International Information Security Conference (SEC 2006) (2006).
-
CAMENISCH, J. Protecting (anonymous) credentials with the trusted computing group's trusted platform modules v.1.2. In Proceedings of the 21st IFIP International Information Security Conference (SEC 2006) (2006).
-
-
-
-
10
-
-
84945135810
-
-
CAMENISCH, J., AND LYSYANSKAYA, A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. in Advances in Cryptology -EUROCRYPT 2001 (2001), B. Pfitzmann, Ed., 2045 of LNCS. Springer Verlag, pp. 93-118.
-
CAMENISCH, J., AND LYSYANSKAYA, A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. in Advances in Cryptology -EUROCRYPT 2001 (2001), B. Pfitzmann, Ed., vol. 2045 of LNCS. Springer Verlag, pp. 93-118.
-
-
-
-
11
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Advances in Cryptology -CRYPTO 2002 , M. Yung, Ed, of, Springer Verlag, pp
-
CAMENISCH, J., AND LYSYANSKAYA, A. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology -CRYPTO 2002 (2002), M. Yung, Ed., vol. 2442 of LNCS, Springer Verlag, pp. 61-76.
-
(2002)
LNCS
, vol.2442
, pp. 61-76
-
-
CAMENISCH, J.1
LYSYANSKAYA, A.2
-
12
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Advances in Cryptology -CRYPTO 2004 , Springer Verlag
-
CAMENISCH, J., AND LYSYANSKAYA, A. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology -CRYPTO 2004 (2004), LNCS, Springer Verlag.
-
(2004)
LNCS
-
-
CAMENISCH, J.1
LYSYANSKAYA, A.2
-
13
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Advances in Cryptology, CRYPTO 2003 , D. Boneh, Ed
-
CAMENISCH, J., AND SHOUP, V. Practical verifiable encryption and decryption of discrete logarithms. In Advances in Cryptology - CRYPTO 2003 (2003), D. Boneh, Ed., LNCS.
-
(2003)
LNCS
-
-
CAMENISCH, J.1
SHOUP, V.2
-
16
-
-
85119830099
-
On signatures of knowledge. Cryptology ePrint Archive
-
Report 2006/184
-
CHASE, M., AND LYSYANSKAYA, A. On signatures of knowledge. Cryptology ePrint Archive, Report 2006/184, 2006.
-
(2006)
-
-
CHASE, M.1
LYSYANSKAYA, A.2
-
17
-
-
0013243382
-
-
CRANOR, L., LANGHEINRICH, M., MARCHIORI, M., PRESLER-MARSHALL, M., AND REAGLE, J. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification.
-
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification
-
-
CRANOR, L.1
LANGHEINRICH, M.2
MARCHIORI, M.3
PRESLER-MARSHALL, M.4
REAGLE, J.5
-
18
-
-
85033903396
-
Directive 95/46/ec of the european parliament and the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
EUROPEAN PARLIAMENT
-
EUROPEAN PARLIAMENT. Directive 95/46/ec of the european parliament and the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities (1995).
-
(1995)
Official Journal of the European Communities
-
-
-
19
-
-
0032640841
-
A cooperative approach to support software deployment using the software dock
-
Los Alamitos, CA, USA, IEEE Computer Society Press, pp
-
HALL, R. S., HEIMBIGNER, D., AND WOLF, A. L. A cooperative approach to support software deployment using the software dock. In ICSE '99: Proceedings of the 21st international conference on Software engineering (Los Alamitos, CA, USA, 1999), IEEE Computer Society Press, pp. 174-183.
-
(1999)
ICSE '99: Proceedings of the 21st international conference on Software engineering
, pp. 174-183
-
-
HALL, R.S.1
HEIMBIGNER, D.2
WOLF, A.L.3
-
21
-
-
34547418335
-
-
HOUSLEY, R., POLK, W., FORD, W., AND SOLO, D. RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Apr. 2002. Status: Informational.
-
HOUSLEY, R., POLK, W., FORD, W., AND SOLO, D. RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Apr. 2002. Status: Informational.
-
-
-
-
22
-
-
34547482659
-
-
IDENTITY-MANAGEMENT. Liberty alliance project. http://www.projectliberty.org.
-
IDENTITY-MANAGEMENT. Liberty alliance project. http://www.projectliberty.org.
-
-
-
-
23
-
-
84858098605
-
-
INTERNET2
-
INTERNET2. Shibboleth, http://shibboleth.internet2.edu.
-
Shibboleth
-
-
-
24
-
-
34547436511
-
-
J. MERRELS, SXIP IDENTITY. DIX: Digital Identity Exchange Protocol. Internet Draft, March 2006.
-
J. MERRELS, SXIP IDENTITY. DIX: Digital Identity Exchange Protocol. Internet Draft, March 2006.
-
-
-
-
27
-
-
0035751908
-
Distributed credential chain discovery in trust management: Extended abstract
-
LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. Distributed credential chain discovery in trust management: extended abstract. In ACM Conference on Computer and Communications Security (2001), pp. 156-165.
-
(2001)
ACM Conference on Computer and Communications Security
, pp. 156-165
-
-
LI, N.1
WINSBOROUGH, W.H.2
MITCHELL, J.C.3
-
28
-
-
34547466918
-
-
LIBERTY ALLIANCE. Liberty alliance id-ff 1.2 specifications. Available at http://www.projectliberty.org.
-
LIBERTY ALLIANCE. Liberty alliance id-ff 1.2 specifications. Available at http://www.projectliberty.org.
-
-
-
-
29
-
-
84858094562
-
-
LÜER, C., AND VAN DER HOEK, A. Jploy: User-centric deployment support in a component platform.
-
LÜER, C., AND VAN DER HOEK, A. Jploy: User-centric deployment support in a component platform.
-
-
-
-
30
-
-
84858094563
-
-
LYSYANSKAYA, A., RIVEST, R., SARAI, Á., AND WOLF, S. Pseudonym systems. In Selected Areas in Cryptography (1999), H. Heys and C. Adams, Eds., 1758 of LNCS, Springer Verlag.
-
LYSYANSKAYA, A., RIVEST, R., SARAI, Á., AND WOLF, S. Pseudonym systems. In Selected Areas in Cryptography (1999), H. Heys and C. Adams, Eds., vol. 1758 of LNCS, Springer Verlag.
-
-
-
-
31
-
-
34547431766
-
-
MICROSOFT. A technical reference for InfoCard v1.0 in windows, 2005.
-
MICROSOFT. A technical reference for InfoCard v1.0 in windows, 2005.
-
-
-
-
32
-
-
0003508562
-
-
NATIONAL INSTITUTE FOR STANDARDS AND TECHNOLOGY NIST, dss
-
NATIONAL INSTITUTE FOR STANDARDS AND TECHNOLOGY (NIST). Digital signature standard (dss), 2000.
-
(2000)
Digital signature standard
-
-
-
33
-
-
34547406429
-
-
OASIS STANDARD. Security assertion markup language (SAML) V2.0, 2005.
-
OASIS STANDARD. Security assertion markup language (SAML) V2.0, 2005.
-
-
-
-
36
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
RIVEST, R., SHAMIR, Á., AND ADLEMAN, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (Feb. 1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
RIVEST, R.1
SHAMIR, A.2
ADLEMAN, L.3
|