Sciweavers

DIM
2007
ACM
13 years 6 months ago
Delayed password disclosure
Markus Jakobsson, Steven Myers
DIM
2007
ACM
13 years 9 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
DIM
2007
ACM
13 years 9 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
DIM
2007
ACM
13 years 9 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
DIM
2007
ACM
13 years 9 months ago
On identity assurance in the presence of federated identity management systems
Yolanta Beres, Adrian Baldwin, Marco Casassa Mont,...
DIM
2007
ACM
13 years 9 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
DIM
2007
ACM
13 years 9 months ago
Password policy simulation and analysis
Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Be...
DIM
2007
ACM
13 years 9 months ago
Certificate-less user authentication with consent
Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi