-
1
-
-
51849161676
-
-
Akamai Technologies, Retrieved from
-
Akamai Technologies. (2006). Retail web site performance. Retrieved from http://www.akamai.com/4seconds
-
(2006)
Retail Web Site Performance
-
-
-
4
-
-
34249874298
-
User centricity: A taxonomy and open issues
-
IOS Press
-
Bhargav-Spantzel, A., Camenisch, J., Gross, A., & Sommer, D. (2007). User centricity: A taxonomy and open issues. Journal of Computer Security, 15(5). IOS Press.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.5
-
-
Bhargav-Spantzel, A.1
Camenisch, J.2
Gross, A.3
Sommer, D.4
-
6
-
-
77953603480
-
Privacy and identity management for everyone
-
Association for Computing Machinery
-
Camenisch, J., Shelat, A., Sommer, D., Fischer-Hübner, S., Hansen, M., & Krasemann, H. ... Tseng, J. (2005). Privacy and identity management for everyone. Proceedings of the First ACM Workshop on Digital Identity Management, Association for Computing Machinery.
-
(2005)
Proceedings of the First ACM Workshop On Digital Identity Management
-
-
Camenisch, J.1
Shelat, A.2
Sommer, D.3
Fischer-Hübner, S.4
Hansen, M.5
Krasemann, H.6
Tseng, J.7
-
7
-
-
33646131730
-
-
Identity Weblog. Retrieved from
-
Cameron, K. (2005). The laws of identity. Identity Weblog. Retrieved from http://www.identityblog.com/stories/2004/12/09/thelaws.html
-
(2005)
The Laws of Identity
-
-
Cameron, K.1
-
10
-
-
34547484089
-
-
MSDN Library. Retrieved from
-
Chappell, D. (2006). Introducing Windows Card-Space. MSDN Library. Retrieved from http://msdn.microsoft.com/enus/library/aa480189.aspx
-
(2006)
Introducing Windows Card-Space
-
-
Chappell, D.1
-
13
-
-
70350406505
-
Risk of the CardSpace protocol
-
Springer
-
Gajek, S., Schwenk, J., Steiner, M., & Xuan, C. (2009). Risk of the CardSpace protocol. Proceedings of the 12th International Conference on Information Security (pp. 278-293), Springer.
-
(2009)
Proceedings of the 12th International Conference On Information Security
, pp. 278-293
-
-
Gajek, S.1
Schwenk, J.2
Steiner, M.3
Xuan, C.4
-
14
-
-
1642281602
-
Privacyenhancing identity management
-
[Elsevier.], doi:10.1016/S1363-4127(04)00014-7
-
Hansen, M., Berlich, B., Camenish, J., Claus, S., Pfitzmann, A., & Waidner, M. (2004). Privacyenhancing identity management. [Elsevier.]. Information Security Technical Report, 9(1), 35-44. doi:10.1016/S1363-4127(04)00014-7
-
(2004)
Information Security Technical Report
, vol.9
, Issue.1
, pp. 35-44
-
-
Hansen, M.1
Berlich, B.2
Camenish, J.3
Claus, S.4
Pfitzmann, A.5
Waidner, M.6
-
15
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Association for Computing Machinery
-
Lampson, B., Abadi, M., Burrows, M., & Wobber, E. (1992). Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4). Association for Computing Machinery.
-
(1992)
ACM Transactions On Computer Systems
, vol.10
, Issue.4
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
17
-
-
51849165619
-
Towards a user-centric identity-usage monitoring system
-
International Academic, Research, and Industry Association
-
Mashima, D., & Ahamad, M. (2008). Towards a user-centric identity-usage monitoring system. Proceedings of the Third International Conference on Internet Monitoring and Protection, International Academic, Research, and Industry Association.
-
(2008)
Proceedings of the Third International Conference On Internet Monitoring and Protection
-
-
Mashima, D.1
Ahamad, M.2
-
20
-
-
78651555609
-
An overview of VeryIDX - A privacy-preserving digital identity management system for mobile devices
-
doi:10.4304/jsw.4.7.696-706
-
Paci, F., Bertino, E., Kerr, S., Squicciarini, A., & Woo, J. (2009). An overview of VeryIDX - A privacy-preserving digital identity management system for mobile devices. Journal of Software, 4(7). doi:10.4304/jsw.4.7.696-706
-
(2009)
Journal of Software
, vol.4
, Issue.7
-
-
Paci, F.1
Bertino, E.2
Kerr, S.3
Squicciarini, A.4
Woo, J.5
|