Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
Free Online Productivity Tools
i2Speak
i2Symbol
i2OCR
iTex2Img
iWeb2Print
iWeb2Shot
i2Type
iPdf2Split
iPdf2Merge
i2Bopomofo
i2Arabic
i2Style
i2Image
i2PDF
iLatex2Rtf
Sci2ools
102
Voted
CCS
2008
ACM
99
views
Security Privacy
»
more
CCS 2008
»
Verified implementations of the information card federated identity-management protocol
15 years 4 months ago
Download
www.cs.umd.edu
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr
Real-time Traffic
CCS 2008
|
Information Card
|
Reference Implementations
|
Security Privacy
|
User Authentication Protocol
|
claim paper
Related Content
»
FedWare Middleware Services to Cope with Information Consistency in Federated Identity Man...
»
Secret Key Authentication with SoftwareOnly Verification
»
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
more »
Post Info
More Details (n/a)
Added
12 Oct 2010
Updated
12 Oct 2010
Type
Conference
Year
2008
Where
CCS
Authors
Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy
Comments
(0)
Researcher Info
Security Privacy Study Group
Computer Vision