-
3
-
-
84930331022
-
-
Identity-management. Liberty alliance project. http://www.projectliberty. org.
-
Identity-Management
-
-
-
5
-
-
34249874298
-
User centricity: A taxonomy and open issues
-
The Second ACM Workshop on Digita; Identity Management - DIM 2006
-
A. Bhargav-Spantzel, J. Camenisch. User Centricity: A Taxonomy and Open Issues. In The Second ACM Workshop on Digital Identity Management - DIM 2006, pages 493-527, 2007. (Pubitemid 47182338)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.5
, pp. 493-527
-
-
Bhargav-Spantzel, A.1
Camenisch, J.2
Gross, T.3
Sommer, D.4
-
6
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10), pages 1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
7
-
-
33749578123
-
On signatures of knowledge
-
Cynthia Dwork, editor, volume 4117 of LNCS
-
M. Chase and A. Lysyanskaya. On signatures of knowledge. In Cynthia Dwork, editor, CRYPTO 2006, volume 4117 of LNCS, pages 78-96, 2006.
-
(2006)
CRYPTO 2006
, pp. 78-96
-
-
Chase, M.1
Lysyanskaya, A.2
-
8
-
-
70350696999
-
-
M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham. Delegatable Anonymous Credentials. http://eprint.iacr.org/2008/428.
-
Delegatable Anonymous Credentials
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
9
-
-
25144470629
-
-
IBM, Microsoft, Actional, BEA, Computer Associates, Layer 7, Oblix, Open Network, Ping Identity, Reactivity, and Verisign. February
-
IBM, Microsoft, Actional, BEA, Computer Associates, Layer 7, Oblix, Open Network, Ping Identity, Reactivity, and Verisign. Web Services Trust Language (WS-Trust). February 2005.
-
(2005)
Web Services Trust Language (WS-Trust)
-
-
-
10
-
-
57749094662
-
Microsoft's vision for an identity metasystem
-
May, http://zoo.cs.yale.edu/classes/cs457/tsui-digital-identity-managemen t.doc
-
Microsoft organization. Microsoft's Vision for an Identity Metasystem. Microsoft Whitepaper, May 2005. http://msdn2.microsoft.com/en-us/library/ ms996422.aspx http://zoo.cs.yale.edu/classes/cs457/tsui-digital-identity- managemen t.doc.
-
(2005)
Microsoft Whitepaper
-
-
-
11
-
-
70349938925
-
Introducing windows cardspace
-
April
-
D. Chappell. Introducing Windows CardSpace. Windows Vista Technical Articles, April 2006 http://msdn2.microsoft.com/en-us/library/aa480189.aspx.
-
(2006)
Windows Vista Technical Articles
-
-
Chappell, D.1
-
12
-
-
84874004570
-
-
CodeIdol.com. InfoCard Architecture and Security http://codeidol.com/ csharp/indigo/InfoCard/InfoCard-Architecture-and-Security/.
-
InfoCard Architecture and Security
-
-
-
13
-
-
77957913739
-
-
Novell corp.
-
Novell corp. Bandit project http://www.bandit-project.org/index.php/ Welcome-to-Bandit.
-
Bandit Project
-
-
-
16
-
-
67549113863
-
-
Microsoft and IBM, May
-
Marc Goodner, Maryann Hondo, Anthony Nadalin, Michael McIntosh, and Don Schmidt. Understanding WS-Federation. Microsoft and IBM, 2007 May.
-
(2007)
Understanding WS-Federation
-
-
Goodner, M.1
Hondo, M.2
Nadalin, A.3
Mcintosh, M.4
Schmidt, D.5
-
18
-
-
79952416277
-
A delegation solution for universal identity management in SOA
-
10.1109/TSC.2010.9
-
Y. Zhang, J.L. Chen. A Delegation Solution for Universal Identity Management in SOA. IEEE Transaction on Services Computing, 3, 2010, 10.1109/TSC.2010.9 .
-
(2010)
IEEE Transaction on Services Computing
, vol.3
-
-
Zhang, Y.1
Chen, J.L.2
-
19
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
J. Camenisch, V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Advances in Cryptology-RYPTO, pp. 126-144, 2003.
-
(2003)
Advances in Cryptology-RYPTO
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
21
-
-
34247496096
-
-
Liberty Alliance Project. Version 1.2, November
-
Liberty Alliance Project. Liberty ID-FF Protocols and Schema Specification. Version 1.2, November 2003. http://www.projectliberty.org/specs.
-
(2003)
Liberty ID-FF Protocols and Schema Specification
-
-
-
22
-
-
77953570949
-
A delegation framework for federated identity management
-
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, Satoru Fujita. A Delegation Framework for Federated Identity Management. Proceedings of the 2005 workshop on Digital identity management, pp. 94-103, 2005.
-
(2005)
Proceedings of the 2005 Workshop on Digital Identity Management
, pp. 94-103
-
-
Gomi, H.1
Hatakeyama, M.2
Hosono, S.3
Fujita, S.4
-
24
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures (position paper)
-
M. Blaze, J. Feigenbaum, A.D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). Lecture Notes in Computer Science 1550 (1999), pp. 59-63, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1550
, Issue.1999
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
26
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
D. Chaum and J.H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Advances in Cryptology-CRYPTO'86, pp. 118-167, 1986.
-
(1986)
Advances in Cryptology-CRYPTO'86
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.H.2
-
27
-
-
85031802442
-
Payment systems and credential mechanisms with provable security against abuse by individuals
-
I.B. Damgard. Payment systems and credential mechanisms with provable security against abuse by individuals. Advances in Cryptology-CRYPTO'88, pp. 328-335, 1988.
-
(1988)
Advances in Cryptology-CRYPTO'88
, pp. 328-335
-
-
Damgard, I.B.1
-
29
-
-
67651053584
-
Pseudonym systems
-
A. Lysyanskaya, R. Rivest, and A. Sahai. Pseudonym systems. In Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, pp. 184-199, 1999.
-
(1999)
Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
-
30
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Birgit Pfitzmann, editor, volume 2045 of LNCS, Springer Verlag
-
J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Birgit Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pp. 93-118. Springer Verlag, 2001.
-
(2001)
EUROCRYPT 2001
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
31
-
-
35248839965
-
A signature scheme with efficient protocols
-
volume 2576 of LNCS
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In SCN 2002, volume 2576 of LNCS, pp. 268-289, 2002.
-
(2002)
SCN 2002
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
32
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
volume 3152 of LNCS
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO 2004, volume 3152 of LNCS, pp. 56-72, 2004.
-
(2004)
CRYPTO 2004
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
|