Sciweavers

1663 search results - page 28 / 333
» Privacy and Identity Management
Sort
View
73
Voted
DIM
2008
ACM
15 years 3 months ago
Symmetric identity federation for fixed-mobile convergence
Makiko Aoyagi, Tsuyoshi Abe, Kenji Takahashi
136
Voted
IEEEARES
2007
IEEE
15 years 8 months ago
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now, e-voting protocols have tried to make communicatio...
Orhan Cetinkaya, Ali Doganaksoy
JCM
2006
112views more  JCM 2006»
15 years 1 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
IDTRUST
2010
ACM
15 years 11 days ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
127
Voted
ACISP
2006
Springer
15 years 5 months ago
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can pro...
Shanshan Duan, Zhenfu Cao