-
1
-
-
34547522957
-
User centricity: A taxonomy and open issues
-
A. Bhargav-Spantzel, J. Camenisch, T. Gross, D. Sommer, User centricity: a taxonomy and open issues, Journal of Computer Security 15 (5) (2007) 493-527.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.5
, pp. 493-527
-
-
Bhargav-Spantzel, A.1
Camenisch, J.2
Gross, T.3
Sommer, D.4
-
6
-
-
59249091249
-
A user-centric federated single sign-on system
-
S. Suriadi, E. Foo, A. Jøsang, A user-centric federated single sign-on system, Journal of Network and Computer Applications 32 (2) (2009) 388-401.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.2
, pp. 388-401
-
-
Suriadi, S.1
Foo, E.2
Jøsang, A.3
-
7
-
-
84946833891
-
How to leak a secret
-
Springer
-
R. L. Rivest, A. Shamir, Y. Tauman, How to leak a secret, in: Advances in Cryptology ASIACRYPT 2001, Springer, 2001, pp. 552-565.
-
(2001)
Advances in Cryptology ASIACRYPT 2001
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
9
-
-
80053615549
-
Anonymous authentication from public-key encryption revisited
-
Springer
-
D. Slamanig, Anonymous authentication from public-key encryption revisited, in: Communications and Multimedia Security, Springer, 2011, pp. 247-249.
-
(2011)
Communications and Multimedia Security
, pp. 247-249
-
-
Slamanig, D.1
-
10
-
-
79955991061
-
Research on trust model of pki
-
2011 International Conference on IEEE
-
H. Liping, S. Lei, Research on trust model of pki, in: Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on, Vol. 1, IEEE, 2011, pp. 232-235.
-
(2011)
Intelligent Computation Technology and Automation (ICICTA)
, vol.1
, pp. 232-235
-
-
Liping, H.1
Lei, S.2
-
11
-
-
71749098580
-
Trust model to enhance security and interoperability of cloud environment
-
Springer
-
W. Li, L. Ping, Trust model to enhance security and interoperability of cloud environment, in: Cloud Computing, Springer, 2009, pp. 69-79.
-
(2009)
Cloud Computing
, pp. 69-79
-
-
Li, W.1
Ping, L.2
-
12
-
-
74349131594
-
Pki-based trust management in inter-domain scenarios
-
G. López Millán, M. Gil Pérez, G. Martínez Pérez, A. F. Gómez Skarmeta, Pki-based trust management in inter-domain scenarios, Computers & Security 29 (2) (2010) 278-290.
-
(2010)
Computers & Security
, vol.29
, Issue.2
, pp. 278-290
-
-
López Millán, G.1
Gil Pérez, M.2
Martínez Pérez, G.3
Gómez Skarmeta, A.F.4
-
13
-
-
84857185192
-
Trusted framework for health information exchange
-
IEEE, 2011
-
M. Afzal, M. Hussain, M. Ahmad, Z. Anwar, Trusted framework for health information exchange, in: Frontiers of Information Technology (FIT), 2011, IEEE, 2011, pp. 308-313.
-
(2011)
Frontiers of Information Technology (FIT)
, pp. 308-313
-
-
Afzal, M.1
Hussain, M.2
Ahmad, M.3
Anwar, Z.4
-
14
-
-
0034471216
-
Anonymous public-key certificates for anonymous and fair document exchange
-
N. Zhang, Q. Shi, M. Merabti, Anonymous public-key certificates for anonymous and fair document exchange, IEE Proceedings-Communications 147 (6) (2000) 345-350.
-
(2000)
IEE Proceedings-Communications
, vol.147
, Issue.6
, pp. 345-350
-
-
Zhang, N.1
Shi, Q.2
Merabti, M.3
-
15
-
-
84896949988
-
-
It's easy to begin sccepting openid on your website
-
OpenID, It's easy to begin sccepting openid on your website (2013). URL http://openid.net/add-openid/
-
(2013)
-
-
-
16
-
-
84897009815
-
-
S. Cantor, Understanding shibboleth (2010). URL https://wiki.shibboleth. net/confluence/display/SHIB/UnderstandingShibboleth
-
(2010)
Understanding Shibboleth
-
-
Cantor, S.1
-
18
-
-
79959906796
-
Cryptonet: Security management protocols
-
A. G. Abbasi, S. Muftic, Cryptonet: security management protocols, in: Proceedings of the 9th WSEAS international conference on Data networks, communications, computers, World Scientific and Engineering Academy and Society (WSEAS), 2010, pp. 15-20.
-
(2010)
Proceedings of the 9th WSEAS International Conference on Data Networks, Communications, Computers, World Scientific and Engineering Academy and Society (WSEAS)
, pp. 15-20
-
-
Abbasi, A.G.1
Muftic, S.2
|