Sciweavers

4320 search results - page 32 / 864
» Identity management architecture
Sort
View
ADHOCNOW
2006
Springer
14 years 3 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
ASIACRYPT
2005
Springer
14 years 3 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
DIGRA
2005
Springer
14 years 3 months ago
Pretty good for a girl: gender, identity and computer games
Young people’s participation in online digital culture is one of the most efficient means by which they become proficient in the management of Information and Communications Tec...
Catherine Beavis
CORR
2011
Springer
162views Education» more  CORR 2011»
13 years 1 months ago
Re-thinking Enrolment in Identity Card Schemes
Many countries around the world have initiated national ID card programs in the last decade. These programs are considered of strategic value to governments due to its contributio...
Ali M. Al-Khouri
DISCEX
2003
IEEE
14 years 3 months ago
Integrated Security Services for Dynamic Coalitions
Coalitions are collaborative networks of autonomous domains where resource sharing is achieved by the distribution of access permissions to coalition members based on negotiated r...
Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bo...