-
2
-
-
70349250798
-
-
Australian Government Authentication Framework for Individuals
-
Australian Government Authentication Framework for Individuals. http://www.agimo.gov.au/infrastructure/authentication/, 2008.
-
(2008)
-
-
-
3
-
-
70349248927
-
-
E-government in New Zealand
-
E-government in New Zealand. http://www.e.govt.nz, 2008.
-
(2008)
-
-
-
6
-
-
70349241139
-
-
ENISA
-
ENISA. The ENISA project page. http://www.enisa.europa.eu/, 2008.
-
(2008)
The ENISA project page
-
-
-
7
-
-
70349247332
-
-
European Commission, Directorate General Enterprise, IDA
-
European Commission - Directorate General Enterprise. Interchange of Data between Administrations (IDA). http://ec.europa.eu/idabc/en/document/3532/5585.
-
Interchange of Data between Administrations
-
-
-
9
-
-
0036053761
-
Choosing passwords: Security and human factors
-
Jan
-
E. Gehringer. Choosing passwords: security and human factors. Technology and Society, Jan 2002.
-
(2002)
Technology and Society
-
-
Gehringer, E.1
-
12
-
-
70349242694
-
The Memorability and Security of Passwords: Some Empirical Results
-
Technical Report No. 500, Computer Laboratory, University of Cambridge, Jan
-
J. Jeff, Y. Alan, B. Ross, and A. Alasdair. The Memorability and Security of Passwords: Some Empirical Results. Technical Report No. 500, Computer Laboratory, University of Cambridge, Jan 2000.
-
(2000)
-
-
Jeff, J.1
Alan, Y.2
Ross, B.3
Alasdair, A.4
-
13
-
-
54849408511
-
Trust requirements in identity management
-
Darlinghurst, Australia, Australia, Australian Computer Society, Inc
-
A. Josang, J. Fabre, B. Hay, J. Dalziel, and S. Pope. Trust requirements in identity management. In ACSW Frontiers '05: Proceedings of the 2005 Australasian workshop on Grid computing and e-research, pages 99-108, Darlinghurst, Australia, Australia, 2005. Australian Computer Society, Inc.
-
(2005)
ACSW Frontiers '05: Proceedings of the 2005 Australasian workshop on Grid computing and e-research
, pp. 99-108
-
-
Josang, A.1
Fabre, J.2
Hay, B.3
Dalziel, J.4
Pope, S.5
-
14
-
-
34247499953
-
-
H. Kim, J. Oh, and J. Choi. Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. Proceedings of the 30th Annual International Computer Software and Applications Conference, Jan 2006
-
H. Kim, J. Oh, and J. Choi. Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. Proceedings of the 30th Annual International Computer Software and Applications Conference, Jan 2006.
-
-
-
-
15
-
-
33749415612
-
Analysis of Brute-Force Break-Ins of a Palmprint Authentication System
-
Man and Cybernetics, Jan
-
A. Kong, D. Zhang, and M. Kamel. Analysis of Brute-Force Break-Ins of a Palmprint Authentication System. IEEE Transactions on Systems, Man and Cybernetics, Jan 2006.
-
(2006)
IEEE Transactions on Systems
-
-
Kong, A.1
Zhang, D.2
Kamel, M.3
-
16
-
-
36849070972
-
Three measures for secure palmprint identification
-
Jan
-
A. Kong, D. Zhang, and M. Kamel. Three measures for secure palmprint identification. Pattern Recognition, Jan 2008.
-
(2008)
Pattern Recognition
-
-
Kong, A.1
Zhang, D.2
Kamel, M.3
-
17
-
-
70349231839
-
-
KWINT Project
-
KWINT Project. A safer internet for all. http://www.ecp.nl/downloads/id= 43/download.html, 2007.
-
(2007)
A safer internet for all
-
-
-
18
-
-
70349262911
-
SOA Security - Secure Cross-Organizational Service Composition
-
Stuttgart, Germany, Fraunhofer IRB-Verlag. ISBN 978-3-8167-7493-8
-
M. Menzel, I. Thomas, C. Wolter, and C. Meinel. SOA Security - Secure Cross-Organizational Service Composition. In Proceedings of the Stuttgarter Softwaretechnik Forum 2007 (SSF 2007), pages 41 - 53, Stuttgart, Germany, 2007. Fraunhofer IRB-Verlag. ISBN 978-3-8167-7493-8.
-
(2007)
Proceedings of the Stuttgarter Softwaretechnik Forum 2007 (SSF 2007)
, pp. 41-53
-
-
Menzel, M.1
Thomas, I.2
Wolter, C.3
Meinel, C.4
-
19
-
-
70349242695
-
-
D. Nali and J. Thorpe. Analyzing User Choice in Graphical Passwords. scs.carleton.ca.
-
D. Nali and J. Thorpe. Analyzing User Choice in Graphical Passwords. scs.carleton.ca.
-
-
-
-
20
-
-
22144441587
-
-
National Institute of Standards and Technology NIST, FpVTE
-
National Institute of Standards and Technology (NIST). Fingerprint Vendor Technology Evaluation (FpVTE) 2003.
-
(2003)
Fingerprint Vendor Technology Evaluation
-
-
-
21
-
-
27544477471
-
-
National Institute of Standards and Technology NIST
-
National Institute of Standards and Technology (NIST). Electronic Authentication Guideline, 2007.
-
(2007)
Electronic Authentication Guideline
-
-
-
22
-
-
46449093648
-
-
X. Ni and J. Luo. A Trust Aware Access Control in Service Oriented Grid Environment. Sixth International Conference on Grid and Cooperative Computing, pages 417-422, 2007.
-
X. Ni and J. Luo. A Trust Aware Access Control in Service Oriented Grid Environment. Sixth International Conference on Grid and Cooperative Computing, pages 417-422, 2007.
-
-
-
-
23
-
-
70349230397
-
Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0
-
OASIS, August
-
OASIS. Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Committee Draft 01, August 2004.
-
(2004)
OASIS Committee Draft 01
-
-
-
24
-
-
44949218700
-
Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0
-
OASIS, March
-
OASIS. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard Specification, March 2005.
-
(2005)
OASIS Standard Specification
-
-
-
25
-
-
74049094639
-
Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.02
-
OASIS, March
-
OASIS. Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.02 . OASIS Standard Specification, March 2005.
-
(2005)
OASIS Standard Specification
-
-
-
29
-
-
70349241138
-
Security analysis of smartcard to card reader communications for biometric
-
Jan
-
L. Rila and C. Mitchell. Security analysis of smartcard to card reader communications for biometric. citeseer.ist.psu.edu, Jan 2002.
-
(2002)
-
-
Rila, L.1
Mitchell, C.2
-
32
-
-
34548128864
-
Requirements of federated trust management for service-oriented architectures
-
Jan
-
Z. Wu and A. C. Weaver. Requirements of federated trust management for service-oriented architectures. International Journal of Information Security, Jan 2007.
-
(2007)
International Journal of Information Security
-
-
Wu, Z.1
Weaver, A.C.2
|