-
2
-
-
34547540777
-
Practical identity theft prevention using aggregated proof of knowledge
-
Technical report, CS Department, CERIAS TR 2006-26
-
A. Bhargav-Spantzel, A. C. Squicciarini, R. Xue, and E. Bertino. Practical identity theft prevention using aggregated proof of knowledge. Technical report, CS Department, 2006. CERIAS TR 2006-26.
-
(2006)
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Xue, R.3
Bertino, E.4
-
4
-
-
0002751414
-
The ESPRIT project CAFE - high security digital payment systems
-
J.-P. Boly, A. Bosselaers, R. Cramer, R. Michelsen, S. F. Mjolsnes, F. Muller, T. P. Pedersen, B. Pfitzmann, P. de Rooij, B. Schoenmakers, M. Schunter, L. Vallee, and M. Waidner. The ESPRIT project CAFE - high security digital payment systems. In ESORICS, pages 217-230, 1994.
-
(1994)
ESORICS
, pp. 217-230
-
-
Boly, J.-P.1
Bosselaers, A.2
Cramer, R.3
Michelsen, R.4
Mjolsnes, S.F.5
Muller, F.6
Pedersen, T.P.7
Pfitzmann, B.8
de Rooij, P.9
Schoenmakers, B.10
Schunter, M.11
Vallee, L.12
Waidner, M.13
-
6
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
7
-
-
78651561296
-
Exploiting space and location as a design framework for interactive mobile systems
-
A. Dix, T. Rodden, N. Davies, J. Trevor, A. Friday, and K. Palfreyman. Exploiting space and location as a design framework for interactive mobile systems. ACM Transactions on Computer Human Interaction, 7(3):285-321, 2000.
-
(2000)
ACM Transactions on Computer Human Interaction
, vol.7
, Issue.3
, pp. 285-321
-
-
Dix, A.1
Rodden, T.2
Davies, N.3
Trevor, J.4
Friday, A.5
Palfreyman, K.6
-
8
-
-
0036992249
-
Framework for security and privacy in automotive telematics
-
New York, NY, USA, ACM Press
-
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J.-M. Tang. Framework for security and privacy in automotive telematics. In WMC '02: Proceedings of the 2nd international workshop on Mobile commerce, pages 25-32, New York, NY, USA, 2002. ACM Press.
-
(2002)
WMC '02: Proceedings of the 2nd international workshop on Mobile commerce
, pp. 25-32
-
-
Duri, S.1
Gruteser, M.2
Liu, X.3
Moskowitz, P.4
Perez, R.5
Singh, M.6
Tang, J.-M.7
-
9
-
-
63749102073
-
Mobile identity management
-
Technical Report 178, Institut fr Informatik, Universitt Freiburg, October
-
U. Jendricke, M. Kreutzer, and A. Zugenmaier. Mobile identity management. Technical Report 178, Institut fr Informatik, Universitt Freiburg, October 2002.
-
(2002)
-
-
Jendricke, U.1
Kreutzer, M.2
Zugenmaier, A.3
-
10
-
-
12344253674
-
-
O. Kolsi and T. Virtanen. Midp 2.0 security enhancements. In HICSS '04: Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9, page 90287.3, Washington, DC, USA, 2004. IEEE Computer Society.
-
O. Kolsi and T. Virtanen. Midp 2.0 security enhancements. In HICSS '04: Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9, page 90287.3, Washington, DC, USA, 2004. IEEE Computer Society.
-
-
-
-
12
-
-
84880241049
-
-
S. F. Mjolsnes and C. Rong. Localized credentials for server assisted mobile wallet. ICCNMC'01: International Conference on Computer Networks and Mobile Computing, 00:203, 2001.
-
S. F. Mjolsnes and C. Rong. Localized credentials for server assisted mobile wallet. ICCNMC'01: International Conference on Computer Networks and Mobile Computing, 00:203, 2001.
-
-
-
-
13
-
-
1642292943
-
-
K. Rannenberg. Identity management in mobile cellular networks and related applications. Information Security Technical Report 9, Johann Wolfgang Goethe University Frankfurt, January 2004.
-
K. Rannenberg. Identity management in mobile cellular networks and related applications. Information Security Technical Report 9, Johann Wolfgang Goethe University Frankfurt, January 2004.
-
-
-
-
14
-
-
85014332650
-
Security in embedded systems: Design challenges
-
461-491
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady. Security in embedded systems: Design challenges. Trans. on Embedded Computing Sys., 3(3):461-491, 2004.
-
(2004)
Trans. on Embedded Computing Sys
, vol.3
, Issue.3
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
63749108472
-
Toolkit: Java is jumpin
-
A. Wolfe. Toolkit: Java is jumpin'. Queue, 1(10):16-19, 2004.
-
(2004)
Queue
, vol.1
, Issue.10
, pp. 16-19
-
-
Wolfe, A.1
-
18
-
-
0032756717
-
Collaborative reputation mechanisms in electronic marketplaces
-
G. Zacharia, A. Moukas, and P. Maes. Collaborative reputation mechanisms in electronic marketplaces. In HICSS, 1999.
-
(1999)
HICSS
-
-
Zacharia, G.1
Moukas, A.2
Maes, P.3
|