Sciweavers

1663 search results - page 66 / 333
» Privacy and Identity Management
Sort
View
CN
2004
108views more  CN 2004»
15 years 4 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
142
Voted
ADHOCNOW
2006
Springer
15 years 10 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
ASIACRYPT
2005
Springer
15 years 9 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
DIGRA
2005
Springer
15 years 9 months ago
Pretty good for a girl: gender, identity and computer games
Young people’s participation in online digital culture is one of the most efficient means by which they become proficient in the management of Information and Communications Tec...
Catherine Beavis
CORR
2011
Springer
162views Education» more  CORR 2011»
14 years 8 months ago
Re-thinking Enrolment in Identity Card Schemes
Many countries around the world have initiated national ID card programs in the last decade. These programs are considered of strategic value to governments due to its contributio...
Ali M. Al-Khouri