-
1
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast ecryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005) (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
2
-
-
33745855807
-
Strongly unforgeable signatures based on computational Diffie-Hellman
-
DOI 10.1007/11745853-15, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings
-
Boneh, D., Shen, E., Waters, B.: Strongly unforgeable signatures based on computational diffie-hellman. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 229-240. Springer, Heidelberg (2006) (Pubitemid 44029584)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3958
, pp. 229-240
-
-
Boneh, D.1
Shen, E.2
Waters, B.3
-
3
-
-
84885891468
-
Design and implementation of the idemix anonymous credential system
-
Atluri, V. (ed.) ACM, Innsbruck
-
Camenisch, J., Herreweghen, E.V.: Design and Implementation of the idemix Anonymous Credential System. In: Atluri, V. (ed.) ACM CCS 2001, pp. 93-118. ACM, Innsbruck (2001)
-
(2001)
ACM CCS 2001
, pp. 93-118
-
-
Camenisch, J.1
Herreweghen, E.V.2
-
4
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001) (Pubitemid 33275827)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
5
-
-
79952588976
-
Federated identity management
-
Petkovic, M. and Jonker, W. (eds.) Springer, Heidelberg
-
Camenisch, J. and Pfitzmann, B.: Federated identity management. In: Petkovic, M. and Jonker, W. (eds.), Preceedings: Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, vol. 2851, pp 213-238. Springer, Heidelberg (2007)
-
(2007)
Preceedings: Security, Privacy, and Trust in Modern Data Management. Data-centric Systems and Applications
, vol.2851
, pp. 213-238
-
-
Camenisch, J.1
Pfitzmann, B.2
-
6
-
-
33646131730
-
The laws of identity
-
Microsoft Corporation
-
Cameron, K.: The laws of identity. Architect of Identity. Microsoft Corporation (2005)
-
(2005)
Architect of Identity
-
-
Cameron, K.1
-
7
-
-
27144470281
-
Threspassport - A distributed single sign-on service
-
Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) LNCS Springer, Heidelberg
-
Chen, T., Zhu, B.B., Li, S., Cheng, X.: Threspassport-A distributed single sign-on service. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005. LNCS, vol. 3645, pp. 772-780. Springer, Heidelberg (2005)
-
(2005)
ICIC 2005
, vol.3645
, pp. 772-780
-
-
Chen, T.1
Zhu, B.B.2
Li, S.3
Cheng, X.4
-
9
-
-
35248899841
-
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
-
Public Key Cryptography - PKC 2003
-
Dodis, Y., Fazio, N.: Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 100-115. Springer, Heidelberg (2002) (Pubitemid 36137131)
-
(2002)
Lecture Notes in Computer Science
, Issue.2567
, pp. 100-115
-
-
Dodis, Y.1
Fazio, N.2
-
10
-
-
84979291225
-
Broadcast encryption
-
Stinson, D.R. (ed.) LNCS Springer, Heidelberg
-
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
-
(1994)
CRYPTO 1993
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
11
-
-
0023569922
-
Zero knowledge proofs of identity
-
ACM, New York
-
Fiege, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. In: ACM STOC 1987, pp. 210-217. ACM, New York (1987)
-
(1987)
ACM STOC 1987
, pp. 210-217
-
-
Fiege, U.1
Fiat, A.2
Shamir, A.3
-
12
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the Association for Comptuing Machinery 38(1), 691-729 (1991)
-
(1991)
Journal of the Association for Comptuing Machinery
, vol.38
, Issue.1
, pp. 691-729
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281-308 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
14
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
ACM, Providence
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: ACM STOC 1985, pp. 291-304. ACM, Providence (1985)
-
(1985)
ACM STOC 1985
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
15
-
-
23944485926
-
Peer-to-peer authentication with a distributed single sign-on service
-
Voelker, G.M., Shenker, S. (eds.) LNCS Springer, Heidelberg
-
Josephson, W.K., Sirer, E.G., Schneider, F.B.: Peer-to-peer authentication with a distributed single sign-on service. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol. 3279, pp. 250-258. Springer, Heidelberg (2005)
-
(2005)
IPTPS 2004
, vol.3279
, pp. 250-258
-
-
Josephson, W.K.1
Sirer, E.G.2
Schneider, F.B.3
-
16
-
-
0033719386
-
Risks of the passport single signon protocol
-
Kormann, D.P., Rubin, A.D.: Risks of the passport single signon protocol. Computer Networks 33(1), 51-58 (2000)
-
(2000)
Computer Networks
, vol.33
, Issue.1
, pp. 51-58
-
-
Kormann, D.P.1
Rubin, A.D.2
-
17
-
-
84885886194
-
-
Liberty Alliance, http://www.projectliberty.org
-
-
-
-
18
-
-
84885890293
-
-
Liberty ID-WSF Authentication Service and Single Sign-On Service Specification Version: v2.0
-
Liberty Alliance. Liberty ID-WSF Authentication Service and Single Sign-On Service Specification Version: v2.0, http://www.projectliberty.org/ liberty/content/download/871/6189/file/liberty-idwsf-authn-svc-v2.0.pdf
-
-
-
-
19
-
-
67651053584
-
Pseudonym systems
-
Heys, H.M., Adams, C.M. (eds.) LNCS Springer, Heidelberg
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184-199. Springer, Heidelberg (2000)
-
(2000)
SAC 1999
, vol.1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
-
21
-
-
84885888072
-
-
OpenID, http://openid.net
-
-
-
-
22
-
-
0041848577
-
Microsoft .Net passport: A security analysis
-
Oppliger, R.: Microsoft .Net passport: a security analysis. Computer 36(7), 29-35 (2003)
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 29-35
-
-
Oppliger, R.1
-
23
-
-
1642359636
-
Microsoft. Net passport and identity managemen
-
Oppliger, R.: Microsoft. Net passport and identity managemen. Information Security Technical Report 9(1), 26-34 (2004)
-
(2004)
Information Security Technical Report
, vol.9
, Issue.1
, pp. 26-34
-
-
Oppliger, R.1
-
24
-
-
63449115454
-
A taxonomy of single sign-on systems
-
Safavi-Naini, R., Seberry, J. (eds.) LNCS Springer, Heidelberg
-
Pashalidis, A., Mitchell, C.J.: A taxonomy of single sign-on systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 249-265. Springer, Heidelberg (2003)
-
(2003)
ACISP 2003
, vol.2727
, pp. 249-265
-
-
Pashalidis, A.1
Mitchell, C.J.2
-
25
-
-
35048827792
-
Single sign-on using trusted platforms
-
Safavi-Naini, R., Seberry, J. (eds.) LNCS Springer, Heidelberg
-
Pashalidis, A., Mitchell, C.J.: Single sign-on using trusted platforms. In: Safavi-Naini, R., Seberry, J. (eds.) ISC 2003. LNCS, vol. 2851, pp. 54-68. Springer, Heidelberg (2003)
-
(2003)
ISC 2003
, vol.2851
, pp. 54-68
-
-
Pashalidis, A.1
Mitchell, C.J.2
-
26
-
-
84954184814
-
Using GSM/UMTS for single sign-on
-
IEEE, Bratislava
-
Pashalidis, A., Mitchell, C.J.: Using GSM/UMTS for single sign-on. In: IEEE Sym-poTIC 2003, pp. 138-145. IEEE, Bratislava (2003)
-
(2003)
IEEE Sym-poTIC 2003
, pp. 138-145
-
-
Pashalidis, A.1
Mitchell, C.J.2
-
27
-
-
57749119385
-
User-centric PKI
-
Seamons, K., McBurnett, N., Polk, T. (eds.) ACM, Gaithersburg
-
Perlman, R., Kaufman, C.: User-centric PKI. In: Seamons, K., McBurnett, N., Polk, T. (eds.) IDtrust 2008, pp. 59-71. ACM, Gaithersburg (2008)
-
(2008)
IDtrust 2008
, pp. 59-71
-
-
Perlman, R.1
Kaufman, C.2
-
29
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005) (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
30
-
-
34547404349
-
User centricity: A taxonomy and open issues
-
DOI 10.1145/1179529.1179531, Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
Spantzely, A.B., Camenisch, J., Gross, T., Dieter Sommer, D.: User centricity: a taxonomy and open issues. In: ACM DIM 2006, pp. 1-10. ACM, Alexandria (2006) (Pubitemid 47165639)
-
(2006)
Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 1-10
-
-
Bhargav-Spantzely, A.1
Camenisch, J.2
Gross, T.3
Sommer, D.4
-
31
-
-
59249091249
-
A user-centric federated single sign-on system
-
Suriadi, S., Foo, E., Jsang, A.: A user-centric federated single sign-on system. Journal of Network and Computer Applications 32(2), 388-401 (2009)
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.2
, pp. 388-401
-
-
Suriadi, S.1
Foo, E.2
Jsang, A.3
|