Sciweavers

1663 search results - page 38 / 333
» Privacy and Identity Management
Sort
View
WETICE
2002
IEEE
15 years 9 months ago
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. cons...
K. Shum, Victor K. Wei
ISW
2009
Springer
15 years 10 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
DIM
2005
ACM
15 years 6 months ago
DECIDE: a scheme for decentralized identity escrow
Noburou Taniguchi, Koji Chida, Osamu Shionoiri, At...
LOCWEB
2009
ACM
15 years 10 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
IEEEARES
2007
IEEE
15 years 10 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...