-
1
-
-
84944792110
-
TRBAC: A Temporal Role-based Access Control
-
E.Bertino, P.Bonatti, E.Ferrari. TRBAC: A Temporal Role-based Access Control, ACM Transactions on Information and System Security 4(3), pp. 191-233, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
2
-
-
35248835575
-
Aggregate and verifiably encrypted signatures frombilinear maps
-
Proceedings of Advances is Cryptology Eurocrypt 03, Springer-Verlag
-
D. Boneh, C. Gentry, H. Shacham, and B. Lynn. Aggregate and verifiably encrypted signatures frombilinear maps. In Proceedings of Advances is Cryptology Eurocrypt 03, LNCS. Springer-Verlag, 2003.
-
(2003)
LNCS
-
-
Boneh, D.1
Gentry, C.2
Shacham, H.3
Lynn, B.4
-
4
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Bart Preneel, editor, Advances in Cryptology, EUROCRYPT 2000, of, Springer-Verlag
-
F. Boudot. Efficient proofs that a committed number lies in an interval. In Bart Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pp. 431-444. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
5
-
-
84949198248
-
-
E.F. Brickell and D. Chaum and I. Damgård and J. van de Graaf. Gradual and Verifiable Release of a Secret. In Proceedings of the conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag, pp. 156-166, 1988.
-
E.F. Brickell and D. Chaum and I. Damgård and J. van de Graaf. Gradual and Verifiable Release of a Secret. In Proceedings of the conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag, pp. 156-166, 1988.
-
-
-
-
7
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
ACM Press, New York, NY, USA
-
J. Camenisch and E. V. Herreweghen. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 2130, ACM Press, New York, NY, USA, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 2130
-
-
Camenisch, J.1
Herreweghen, E.V.2
-
8
-
-
84957661460
-
-
A. Chan and Y. Frankel and Y. Tsiounis. Easy comeeasy go divisible cash. In Proceedings of Eurocrypt '98 Lecture Notes in Computer Science, 1998
-
A. Chan and Y. Frankel and Y. Tsiounis. Easy comeeasy go divisible cash. In Proceedings of Eurocrypt '98 Lecture Notes in Computer Science, 1998
-
-
-
-
9
-
-
9944223229
-
Palmhashing: A novel approach for cancelable biometrics
-
T. Connie, A. Teoh, M. Goh, and D. Ngo. Palmhashing: A novel approach for cancelable biometrics, Information Processing Letters 93(1), pp. 15, 2005.
-
(2005)
Information Processing Letters
, vol.93
, Issue.1
, pp. 15
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
11
-
-
33745466910
-
The battle against phishing: Dynamic security skins
-
ACM Press, New York, NY, USA2005
-
R. Dhamija and J. D. Tygar. The battle against phishing: Dynamic security skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security, pp. 7788, ACM Press, New York, NY, USA2005.
-
Proceedings of the 2005 Symposium on Usable Privacy and Security
, pp. 7788
-
-
Dhamija, R.1
Tygar, J.D.2
-
12
-
-
70349652930
-
-
Federal Trade Commission fact sheet, Aberdeen group, identity theft: A 2 trillion criminal industry in 2005. http://www.ustreas.gov/offices/ domesticfinance/financial-institution/cip/pdf/identity-theftfact-sheet.pdf.
-
Federal Trade Commission fact sheet, Aberdeen group, identity theft: A 2 trillion criminal industry in 2005. http://www.ustreas.gov/offices/ domesticfinance/financial-institution/cip/pdf/identity-theftfact-sheet.pdf.
-
-
-
-
13
-
-
0012207557
-
Consistent, Yet Anonymous,Web Access with LPWA
-
E. Gabber, P. B. Gibbons, D.M. Kristol, Y. Matias, A. J. Mayer. Consistent, Yet Anonymous,Web Access with LPWA. Comm. ACM 42(1), pp. 42-47, 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.1
, pp. 42-47
-
-
Gabber, E.1
Gibbons, P.B.2
Kristol, D.M.3
Matias, Y.4
Mayer, A.J.5
-
14
-
-
0034790843
-
Support vector machine pairwise classifiers with error reduction for image classification
-
New York, NY, USA, pp, ACM Press
-
K.-S. Goh, E. Chang, and K.-T. Cheng. Support vector machine pairwise classifiers with error reduction for image classification. In Proceedings of the 2001 ACM workshops on Multimedia, (New York, NY, USA), pp. 3237, ACM Press, 2001.
-
(2001)
Proceedings of the 2001 ACM workshops on Multimedia
, pp. 3237
-
-
Goh, K.-S.1
Chang, E.2
Cheng, K.-T.3
-
15
-
-
0005063385
-
Onion Routing
-
D. M. Goldschlag, M. G. Reed, P. F. Syverson. Onion Routing, Comm. ACM 42(1), pp. 39-41 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.1
, pp. 39-41
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
18
-
-
0035251598
-
Digital government security infrastructure design challenges
-
J. Joshi, A. Ghafoor, W. Aref, E. Spafford. Digital government security infrastructure design challenges, IEEE Computer 34(2), pp. 66-72 (2001).
-
(2001)
IEEE Computer
, vol.34
, Issue.2
, pp. 66-72
-
-
Joshi, J.1
Ghafoor, A.2
Aref, W.3
Spafford, E.4
-
21
-
-
70349655186
-
-
Liberty alliance project
-
Liberty alliance project. http://www.projectliberty.org.
-
-
-
-
24
-
-
70349677265
-
-
OpenID
-
OpenID. http://openid.net.
-
-
-
-
25
-
-
33645133488
-
WS-Specification: Specifying web services using UDDI improvements
-
Springer-Verlag, London, UK
-
S. Overhage and P. Thomas. WS-Specification: Specifying web services using UDDI improvements. In Revised Papers from the NODe 2002 Web and Database-Related Workshops on Web, Web-Services, and Database Systems, pp. 100-119, Springer-Verlag, London, UK, 2003.
-
(2003)
Revised Papers from the NODe 2002 Web and Database-Related Workshops on Web, Web-Services, and Database Systems
, pp. 100-119
-
-
Overhage, S.1
Thomas, P.2
-
26
-
-
70449514719
-
Jungha Woo. VeryIDX - A Digital Identity Management System for Pervasive Systems
-
Capri, Italy, 1-3 October
-
F. Paci, E. Bertino, S. Kerr, A. Lint and A. Squicciarini, Jungha Woo. VeryIDX - A Digital Identity Management System for Pervasive Systems. In Proceedings of 6th IFIP Workshop on Software Technologies for Future and Embedded Ubiquitous Systems (SEUS), Capri, Italy, 1-3 October, 2008.
-
(2008)
Proceedings of 6th IFIP Workshop on Software Technologies for Future and Embedded Ubiquitous Systems (SEUS)
-
-
Paci, F.1
Bertino, E.2
Kerr, S.3
Lint, A.4
Squicciarini, A.5
-
28
-
-
0030212761
-
A realtime matching system for large fingerprint databases
-
N. K. Ratha, K. Karu, S. Chen, and A. K. Jain. A realtime matching system for large fingerprint databases. IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(8), pp. 799813, 1996.
-
(1996)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.18
, Issue.8
, pp. 799813
-
-
Ratha, N.K.1
Karu, K.2
Chen, S.3
Jain, A.K.4
-
29
-
-
0001777423
-
Anonymous Web Transactions with Crowds
-
M.Reiter, A.Rubin. Anonymous Web Transactions with Crowds. Comm. ACM 42(1), pp. 32-38, 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.1
, pp. 32-38
-
-
Reiter, M.1
Rubin, A.2
-
30
-
-
0016555241
-
The protection of information in computer systems
-
J. H. Salzer and M. D. Schroeder. The protection of information in computer systems. In Proceedings of IEEE 63(2):pp. 1278-1308, 1975.
-
(1975)
Proceedings of IEEE
, vol.63
, Issue.2
, pp. 1278-1308
-
-
Salzer, J.H.1
Schroeder, M.D.2
-
31
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Springer-Verlag, pp, London, UK
-
C-P Schnorr. Efficient identification and signatures for smart cards. In Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, pp. 239-252, London, UK, 1990.
-
(1990)
Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
, pp. 239-252
-
-
Schnorr, C.-P.1
-
32
-
-
70349693558
-
-
Shibboleth, Internet2. http://shibboleth.internet2.edu.
-
Internet2
-
-
-
33
-
-
34547505017
-
PP-trust-X: A system for privacy preserving trust negotiations
-
doi.acm.org/10.1145/ 1266977.1266981
-
A.C. Squicciarini, E. Bertino, E. Ferrari, F. Paci, B. Thuraisingham. .PP-trust-X: A system for privacy preserving trust negotiations. ACM Transactions on Information and System Security 10(3), doi.acm.org/10.1145/ 1266977.1266981, 2007.
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.3
-
-
Squicciarini, A.C.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
34
-
-
33646195873
-
ViWiD: Visible watermarking based defense against phishing
-
M. Topkara, A. Kamra, M. J. Atallah, and C. Nita-Rotaru. ViWiD: Visible watermarking based defense against phishing. In Proceedings of International Workshop of Digital Watermarking , 3710, pp. 470483, 2005.
-
(2005)
Proceedings of International Workshop of Digital Watermarking
, vol.3710
, pp. 470483
-
-
Topkara, M.1
Kamra, A.2
Atallah, M.J.3
Nita-Rotaru, C.4
-
35
-
-
70349658177
-
-
USACM The Public Policy Committee of ACM
-
USACM The Public Policy Committee of ACM. Understanding identity and identification. http://usacm.acm.org/usacm/Issues/identity.pdf, 2007.
-
(2007)
Understanding identity and identification
-
-
-
37
-
-
63749100767
-
Verification of receipt from M-commerce transactions on NFC cellular phones
-
Crystal City, Washington DC, USA, July 21-24
-
J. Woo, A. Bhargav-Spantzel, A. Squicciarini, E. Bertino. Verification of receipt from M-commerce transactions on NFC cellular phones. In Proceedings of IEEE Joint Conference on E-Commerce Technology (CEC08) and Enterprise Computing, E-Commerce and E-Services , Crystal City, Washington DC, USA, July 21-24, 2008.
-
(2008)
Proceedings of IEEE Joint Conference on E-Commerce Technology (CEC08) and Enterprise Computing, E-Commerce and E-Services
-
-
Woo, J.1
Bhargav-Spantzel, A.2
Squicciarini, A.3
Bertino, E.4
-
38
-
-
70349652921
-
-
WordNet, http://wordnet.princeton.edu
-
WordNet
-
-
|