Sciweavers

1663 search results - page 38 / 333
» Privacy and Identity Management
Sort
View
WETICE
2002
IEEE
15 years 6 months ago
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. cons...
K. Shum, Victor K. Wei
ISW
2009
Springer
15 years 8 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
DIM
2005
ACM
15 years 3 months ago
DECIDE: a scheme for decentralized identity escrow
Noburou Taniguchi, Koji Chida, Osamu Shionoiri, At...
LOCWEB
2009
ACM
15 years 8 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
IEEEARES
2007
IEEE
15 years 8 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...