메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Digital identity protection - concepts and issues

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; DIGITAL IDENTITY; DIGITAL IDENTITY MANAGEMENT; HIGH ASSURANCE; IDENTITY INFORMATION; IDENTITY VERIFICATION; MULTI-FACTOR; PRIVACY AND SECURITY; PRIVACY PRESERVING; RESEARCH ISSUES; TOOLS AND TECHNIQUES;

EID: 70349671758     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2009.176     Document Type: Conference Paper
Times cited : (14)

References (38)
  • 2
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures frombilinear maps
    • Proceedings of Advances is Cryptology Eurocrypt 03, Springer-Verlag
    • D. Boneh, C. Gentry, H. Shacham, and B. Lynn. Aggregate and verifiably encrypted signatures frombilinear maps. In Proceedings of Advances is Cryptology Eurocrypt 03, LNCS. Springer-Verlag, 2003.
    • (2003) LNCS
    • Boneh, D.1    Gentry, C.2    Shacham, H.3    Lynn, B.4
  • 4
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • Bart Preneel, editor, Advances in Cryptology, EUROCRYPT 2000, of, Springer-Verlag
    • F. Boudot. Efficient proofs that a committed number lies in an interval. In Bart Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pp. 431-444. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 431-444
    • Boudot, F.1
  • 5
    • 84949198248 scopus 로고    scopus 로고
    • E.F. Brickell and D. Chaum and I. Damgård and J. van de Graaf. Gradual and Verifiable Release of a Secret. In Proceedings of the conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag, pp. 156-166, 1988.
    • E.F. Brickell and D. Chaum and I. Damgård and J. van de Graaf. Gradual and Verifiable Release of a Secret. In Proceedings of the conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag, pp. 156-166, 1988.
  • 8
    • 84957661460 scopus 로고    scopus 로고
    • A. Chan and Y. Frankel and Y. Tsiounis. Easy comeeasy go divisible cash. In Proceedings of Eurocrypt '98 Lecture Notes in Computer Science, 1998
    • A. Chan and Y. Frankel and Y. Tsiounis. Easy comeeasy go divisible cash. In Proceedings of Eurocrypt '98 Lecture Notes in Computer Science, 1998
  • 9
    • 9944223229 scopus 로고    scopus 로고
    • Palmhashing: A novel approach for cancelable biometrics
    • T. Connie, A. Teoh, M. Goh, and D. Ngo. Palmhashing: A novel approach for cancelable biometrics, Information Processing Letters 93(1), pp. 15, 2005.
    • (2005) Information Processing Letters , vol.93 , Issue.1 , pp. 15
    • Connie, T.1    Teoh, A.2    Goh, M.3    Ngo, D.4
  • 12
    • 70349652930 scopus 로고    scopus 로고
    • Federal Trade Commission fact sheet, Aberdeen group, identity theft: A 2 trillion criminal industry in 2005. http://www.ustreas.gov/offices/ domesticfinance/financial-institution/cip/pdf/identity-theftfact-sheet.pdf.
    • Federal Trade Commission fact sheet, Aberdeen group, identity theft: A 2 trillion criminal industry in 2005. http://www.ustreas.gov/offices/ domesticfinance/financial-institution/cip/pdf/identity-theftfact-sheet.pdf.
  • 14
    • 0034790843 scopus 로고    scopus 로고
    • Support vector machine pairwise classifiers with error reduction for image classification
    • New York, NY, USA, pp, ACM Press
    • K.-S. Goh, E. Chang, and K.-T. Cheng. Support vector machine pairwise classifiers with error reduction for image classification. In Proceedings of the 2001 ACM workshops on Multimedia, (New York, NY, USA), pp. 3237, ACM Press, 2001.
    • (2001) Proceedings of the 2001 ACM workshops on Multimedia , pp. 3237
    • Goh, K.-S.1    Chang, E.2    Cheng, K.-T.3
  • 18
    • 0035251598 scopus 로고    scopus 로고
    • Digital government security infrastructure design challenges
    • J. Joshi, A. Ghafoor, W. Aref, E. Spafford. Digital government security infrastructure design challenges, IEEE Computer 34(2), pp. 66-72 (2001).
    • (2001) IEEE Computer , vol.34 , Issue.2 , pp. 66-72
    • Joshi, J.1    Ghafoor, A.2    Aref, W.3    Spafford, E.4
  • 21
    • 70349655186 scopus 로고    scopus 로고
    • Liberty alliance project
    • Liberty alliance project. http://www.projectliberty.org.
  • 24
    • 70349677265 scopus 로고    scopus 로고
    • OpenID
    • OpenID. http://openid.net.
  • 29
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous Web Transactions with Crowds
    • M.Reiter, A.Rubin. Anonymous Web Transactions with Crowds. Comm. ACM 42(1), pp. 32-38, 1999.
    • (1999) Comm. ACM , vol.42 , Issue.1 , pp. 32-38
    • Reiter, M.1    Rubin, A.2
  • 30
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. H. Salzer and M. D. Schroeder. The protection of information in computer systems. In Proceedings of IEEE 63(2):pp. 1278-1308, 1975.
    • (1975) Proceedings of IEEE , vol.63 , Issue.2 , pp. 1278-1308
    • Salzer, J.H.1    Schroeder, M.D.2
  • 32
    • 70349693558 scopus 로고    scopus 로고
    • Shibboleth, Internet2. http://shibboleth.internet2.edu.
    • Internet2
  • 35
    • 70349658177 scopus 로고    scopus 로고
    • USACM The Public Policy Committee of ACM
    • USACM The Public Policy Committee of ACM. Understanding identity and identification. http://usacm.acm.org/usacm/Issues/identity.pdf, 2007.
    • (2007) Understanding identity and identification
  • 38
    • 70349652921 scopus 로고    scopus 로고
    • WordNet, http://wordnet.princeton.edu
    • WordNet


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.