|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 777 occurrences of 334 keywords
|
|
|
Results
Found 976 publication records. Showing 976 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
128 | Mohamed Layouni, Hans Vangheluwe |
Anonymous k -Show Credentials. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Privacy-preserving digital credentials, multiple-show credentials, anonymity |
121 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
91 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Attribute-Based Access Control with Hidden Policies and Hidden Credentials. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
Electronic commerce-security, hidden credentials, privacy, authentication, access control, trust negotiation, security and protection, management of computing and information systems |
91 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Hidden access control policies with hidden credentials. |
WPES |
2004 |
DBLP DOI BibTeX RDF |
hidden credentials, privacy, access control, secure multi-party computation, trust negotiation |
83 | Amir Herzberg, Yosi Mass |
Relying Party Credentials Framework. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
74 | William H. Winsborough, Ninghui Li |
Protecting sensitive attributes in automated trust negotiation. |
WPES |
2002 |
DBLP DOI BibTeX RDF |
trust management, trust negotiation, attribute-based access control, digital credentials |
74 | Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi |
Towards Role Based Trust Management without Distributed Searching of Credentials. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
74 | Amir Herzberg, Yosi Mass |
Relying Party Credentials Framework. |
Electron. Commer. Res. |
2004 |
DBLP DOI BibTeX RDF |
|
72 | Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala |
On-board credentials with open provisioning. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
provisioning protocols, trusted computing, credentials, secure hardware |
72 | Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala |
Scheduling execution of credentials in constrained secure environments. |
STC |
2008 |
DBLP DOI BibTeX RDF |
onboard credentials, secure execution environments, trusted hardware, scheduling |
72 | Jiangtao Li 0001, Ninghui Li, William H. Winsborough |
Automated trust negotiation using cryptographic credentials. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
privacy, access control, automated trust negotiation, digital credentials |
64 | Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham |
Randomizable Proofs and Delegatable Anonymous Credentials. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Jan Camenisch |
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Daniele Gorla, Matthew Hennessy, Vladimiro Sassone |
Inferring dynamic credentials for rôle-based trust management. |
PPDP |
2006 |
DBLP DOI BibTeX RDF |
logic programming with negation, rôle-based access control, trust-management, inference systems |
64 | Jan Camenisch, Anna Lysyanskaya |
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
pseudonym system, circular encryption, key-oblivious encryption, Privacy protection, blind signatures, e-cash, credential system |
63 | Shouhuai Xu, Moti Yung |
k-anonymous secret handshakes with reusable credentials. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, anonymity, unlinkability, secret handshake, credential systems |
63 | Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons |
Concealing complex policies with hidden credentials. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
privacy, authentication, secret sharing, identity based encryption, credentials, trust negotiation |
63 | Ting Yu 0001, Marianne Winslett, Kent E. Seamons |
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
interoperable strategies, access control, Automated trust negotiation, digital credentials |
63 | Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman |
Hidden Credentials. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
privacy, authentication, identity based encryption, credentials, trust negotiation |
63 | Russell Impagliazzo, Sara Miner More |
Anonymous credentials with biometrically-enforced non-transferability. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
non-transferability, subliminal-freeness, biometrics, revocation, anonymous credentials |
57 | Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, Nabil R. Adam |
Privacy-preserving trust verification. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
privacy, trust negotiation, compliance checking |
57 | Jianxin Li 0002, Dacheng Zhang, Jinpeng Huai, Jie Xu 0007 |
Context-aware trust negotiation in peer-to-peer service collaborations. |
Peer-to-Peer Netw. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Peer-to-peer access control, Security policy, Privacy preservation, Credential, Trust establishment |
57 | Sultan Almuhammadi, Nien T. Sui |
Safe Credential-Based Trust Protocols: A Framework. |
Web Intelligence |
2006 |
DBLP DOI BibTeX RDF |
Trust protocols, semantic web, agents, zero-knowledge proofs |
57 | Fuchun Guo, Zhide Chen, Yi Mu 0001, Li Xu 0002, Shengyuan Zhang |
Secure and Efficient Trust Negotiation. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Daniel Kouril, Jim Basney |
A credential renewal service for long-running jobs. |
GRID |
2005 |
DBLP DOI BibTeX RDF |
|
55 | N. Asokan, Jan-Erik Ekberg |
A Platform for OnBoard Credentials. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Zhide Chen, Li Xu 0002 |
Anti-Collusion Anonymous Credentials Scheme. |
CIT |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
revocation, anonymous credentials, dynamic accumulators |
50 | Marit Hansen, Hannah Obersteller, Kai Rannenberg, Fatbardh Veseli |
Establishment and Prospects of Privacy-ABCs. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Michael Østergaard Pedersen, Gert Læssøe Mikkelsen, Fatbardh Veseli, Ahmad Sabouri, Tsvetoslava Vateva-Gurova |
Comparison of Mechanisms. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Kai Rannenberg, Welderufael Tesfay, Ahmad Sabouri |
Introduction. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Yannis C. Stamatiou, Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vasiliki Liagkou, Apostolos Pyrgelis, Welderufael Tesfay |
Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Anja Lehmann, Gregory Neven, Franz-Stefan Preiss |
Cryptographic Protocols Underlying Privacy-ABCs. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri |
An Architecture for Privacy-ABCs. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Joerg Abendroth, Marit Hansen, Ioannis Krontiris, Ahmad Sabouri, Eva Schlehahn, Robert Seidl, Harald Zwingelberg |
Privacy-ABC Usage Scenarios. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Gert Læssøe Mikkelsen, Kasper Damgård, Hans Guldager, Jonas Lindstrøm Jensen, Jesus Luna Garcia, Janus Dam Nielsen, Pascal Paillier, Giancarlo Pellegrino, Michael Bladt Stausholm, Neeraj Suri, Heng Zhang 0009 |
Technical Implementation and Feasibility. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Ahmad Sabouri, Souheil Bcheri, Jimm Lerch, Eva Schlehahn, Welderufael Tesfay |
School Community Interaction Platform: the Soderhamn Pilot of ABC4Trust. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Norbert Götze, Daniel Deibler, Robert Seidl |
Experiences and Feedback from the Pilots. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Marit Hansen, Felix Bieker, Daniel Deibler, Hannah Obersteller, Eva Schlehahn, Harald Zwingelberg |
Legal Data Protection Considerations. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Kai Rannenberg, Jan Camenisch, Ahmad Sabouri, Welderufael Tesfay |
Further Challenges. |
Attribute-based Credentials for Trust |
2015 |
DBLP DOI BibTeX RDF |
|
47 | Daisuke Mashima, Mustaque Ahamad, Swagath Kannan |
User-Centric Handling of Identity Agent Compromise. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Private Information: To Reveal or not to Reveal. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
authorization, policies, secure multi-party computation |
47 | Kristof Verslype, Bart De Decker |
Ubiquitous Privacy-Preserving Identity Managment. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Yan He 0001, Miaoliang Zhu, Chunying Zheng |
An Efficient and Minimum Sensitivity Cost Negotiation Strategy in Automated Trust Negotiation. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Zhensong Liao, Hai Jin 0001, Deqing Zou |
A Hidden Credential Based Oblivious Automated Trust Negotiation Model. |
ICEBE |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray |
Trust Negotiations with Customizable Anonymity. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Point-Based Trust: Define How Much Privacy Is Worth. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
private multi-party computation, Trust management, knapsack problem |
47 | William H. Winsborough, Jay Jacobs |
Automated Trust Negotiation in Attribute-based Access Control. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Shouhuai Xu, Moti Yung |
K-Anonymous Multi-party Secret Handshakes. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, multiple personality prevention, anonymity, unlinkability, secret handshake, credential systems |
46 | Walid Bagga, Refik Molva |
Collusion-Free Policy-Based Encryption. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Policy, Credentials, Pairing-Based Cryptography |
46 | Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini |
X-TNL: An XML-based Language for Trust Negotiations. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
disclosure policies, XML, trust negotiation, digital credentials |
45 | Ke Zeng |
Access with Fast Batch Verifiable Anonymous Credentials. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
fine-grained revocation, pairing, batch verification, anonymous credential |
45 | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum |
Counting Abuses Using Flexible Off-line Credentials. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Ting Yu 0001, Marianne Winslett |
Policy migration for sensitive credentials in trust negotiation. |
WPES |
2003 |
DBLP DOI BibTeX RDF |
policy migration, trust negotiation |
38 | David W. Chadwick |
FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
information cards, authorisation, federated identity management, X.509 certificates, CardSpace |
38 | Adam J. Lee, Marianne Winslett |
Towards an efficient and language-agnostic compliance checker for trust negotiation systems. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
compliance checker, satisfying sets, policy, trust negotiation |
38 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Dynamic trust negotiation for flexible e-health collaborations. |
Mardi Gras Conference |
2008 |
DBLP DOI BibTeX RDF |
access control, e-health, trust negotiation |
38 | Deholo Nali, Paul C. van Oorschot |
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Chuan Yue, Haining Wang |
Anti-Phishing in Offense and Defense. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Yan He 0001, Miaoliang Zhu |
A complete and efficient strategy based on petri net in automated trust negotiation. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
negotiation petri net, automated trust negotiation, negotiation strategy |
38 | Mingchu Li, Hongyan Yao, Jianbo Ma |
Recovery Mechanism of Online Certification Chain in Grid Computing. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
Certifucate Chain, Double signature, Grid security, Proxy certificate |
38 | Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
User centricity: a taxonomy and open issues. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, taxonomy, delegation, user centric, user control, identity management systems |
38 | Giuseppe Persiano, Ivan Visconti |
An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. |
Financial Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Marko Niinimäki, John White, Wim Som de Cerff, Joni Hahkala, Tapio Niemi, Mikko Pitkänen |
Using Virtual Organizations Membership System with EDG's Grid Security and Database Access. |
DEXA Workshops |
2004 |
DBLP DOI BibTeX RDF |
databases, Grid, virtual organizations |
38 | Markus Lorch, Jim Basney, Dennis G. Kafura |
A hardware-secured credential repository for Grid PKIs. |
CCGRID |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Xiangli Qu, Xuejun Yang, Guang Xiang, Haifang Zhou |
Credential Trustworthiness-Based Trust Evaluation in Grid. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Bryan Smith, Kent E. Seamons, Michael D. Jones |
Responding to Policies at Runtime in TrustBuilder. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Hristo Koshutanski, Fabio Massacci |
An Interactive Trust Management and Negotiation Scheme. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
Interactive Trust Management, Interactive Access Control, Credential-Based Systems, Logics for Access Control, Trust Management, Internet Computing, Trust Negotiation |
38 | Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels |
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Kent E. Seamons, Marianne Winslett, Ting Yu 0001, Lina Yu, Ryan Jarvis |
Protecting Privacy during On-Line Trust Negotiation. |
Privacy Enhancing Technologies |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Ting Yu 0001, Marianne Winslett, Kent E. Seamons |
Interoperable strategies in automated trust negotiation. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Matt Blaze, John Ioannidis, Angelos D. Keromytis |
Offline Micropayments without Trusted Hardware. |
Financial Cryptography |
2001 |
DBLP DOI BibTeX RDF |
Microbilling, Risk Management, Trust Management, Payments, Digital Cash |
38 | Matt Blaze, Joan Feigenbaum, Martin Strauss 0001 |
Compliance Checking in the PolicyMaker Trust Management System. |
Financial Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
37 | Adam J. Lee, Marianne Winslett |
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
distributed proving, consistency, credentials, trust negotiation |
37 | William H. Winsborough, Ninghui Li |
Safety in automated trust negotiation. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Access control, safety, strategy, credentials, attribute-based access control, automated trust negotiation |
37 | Ian T. Foster, Veronika Nefedova, Mehran Ahsant, Rachana Ananthakrishnan, Lee Liming, Ravi K. Madduri, Olle Mulmo, Laura Pearlman, Frank Siebenlist |
Streamlining Grid Operations: Definition and Deployment of a Portal-based User Registration Service. |
J. Grid Comput. |
2006 |
DBLP DOI BibTeX RDF |
portal security, user registration, Grid, certificate, credentials, public key, Grid security, certificate authority |
37 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
Delegation of Authority, Policies, XACML, Attributes, Credentials, PDP |
37 | Lan Nguyen |
Efficient Dynamic k-Times Anonymous Authentication. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
dynamic k-times anonymous authentication, k-show anonymous credentials, e-tag, privacy, anonymity |
37 | Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater |
Authentication protocols for ad hoc networks: taxonomy and research issues. |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
protocol taxonomy, ad hoc networks, authentication, network security, credentials, identity verification |
37 | Matt Blaze, John Ioannidis, Angelos D. Keromytis |
Trust management for IPsec. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
network security, policy, trust management, IPsec, Credentials, KeyNote |
37 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
37 | Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf 0001 |
Pseudonym Systems. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
nyms, credential transfer, Anonymity, credentials, pseudonyms, unlinkability |
36 | Emerson Ribeiro de Mello, Michelle S. Wangham, Joni da Silva Fraga, Edson Tavares de Camargo, Davi da Silva Böger |
A Model for Authentication Credentials Translation in Service Oriented Architecture. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Security, Web Services, Single Sign-on |
36 | Fred Dushin, Eric Newcomer |
Handling Multiple Credentials in a Heterogeneous SOA Environment. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Lars E. Olson 0001, Michael J. Rosulek, Marianne Winslett |
Harvesting credentials in trust negotiation as an honest-but-curious adversary. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
privacy, protocol, vulnerability, trust negotiation |
36 | David Chaum |
Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
35 | Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer |
A card requirements language enabling privacy-preserving access control. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, policy languages, anonymous credentials, digital credentials |
34 | Aditi Yoganand Athavale, Kuldip Singh, Sandeep K. Sood |
Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography. |
CICSyN |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Elliptic Curve Cryptography, Credentials |
34 | Padmasheela Kiiskilä, Arttu Kukkonen, Henri Pirkkalainen |
Are Micro-Credentials Valuable for Students? Perspective on Verifiable Digital Credentials. |
SN Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Pamela A. Lemoine, Michael D. Richardson |
Micro-Credentials, Nano Degrees, and Digital Badges: New Credentials for Global Higher Education. |
Int. J. Technol. Educ. Mark. |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Jan Camenisch |
Concepts Around Privacy-Preserving Attribute-Based Credentials - Making Authentication with Anonymous Credentials Practical. |
Privacy and Identity Management |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Jim McAlear |
Compartmentalization architectures for protection of Internet credentials and transactions from CPU resident malware: Providing foolproof protection for critical credentials and transactions. |
WorldCIS |
2012 |
DBLP BibTeX RDF |
|
34 | Franz-Stefan Preiss |
Minimizing Information Disclosure in Authentication Transactions with Attribute-Based Credentials (Minimalisatie van vrijgegeven informatie in authenticatietransacties met behulp van attribuut-gebaseerde credentials). (PDF / PS) |
|
2012 |
RDF |
|
28 | Gregory Neven |
Privacy-enhanced access control in primelife. |
Digital Identity Management |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Xiangxi Li, Yu Zhang, Yuxin Deng |
Verifying Anonymous Credential Systems in Applied Pi Calculus. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Hristo Koshutanski, Fabio Massacci |
Interactive access control for autonomic systems: From theory to implementation. |
ACM Trans. Auton. Adapt. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Interactive access control, nonmonotonic policy, logic programming, autonomic systems, abduction, disclosure control |
28 | Rachna Dhamija, Lisa Dusseault |
The Seven Flaws of Identity Management: Usability and Security Challenges. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Towards Decentralised Security Policies for e-Health Collaborations. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Jemal H. Abawajy |
An Online Credential Management Service for InterGrid Computing. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 976 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|