Sciweavers

464 search results - page 18 / 93
» Identity Management
Sort
View
ISW
2009
Springer
14 years 2 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
DIM
2005
ACM
13 years 9 months ago
DECIDE: a scheme for decentralized identity escrow
Noburou Taniguchi, Koji Chida, Osamu Shionoiri, At...
IDTRUST
2010
ACM
14 years 29 days ago
CardSpace-liberty integration for CardSpace users
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of inter...
Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J....
WWW
2001
ACM
14 years 8 months ago
Establishing Persistent Identity using the Handle System
In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the ...
Sam X. Sun
EATIS
2009
ACM
13 years 11 months ago
Towards dynamic trust establishment for identity federation
Federation has emerged as a key concept for identity management, as it is the basis to reduce complexity in the companies and improve user experience. However, the problem of esta...
Florina Almenárez Mendoza, Patricia Arias, ...