Login / Signup
Digital Identity Management
2005
2008
2013
2005
2013
Keyphrases
Publications
2013
Masayuki Abe
,
Jan Camenisch
,
Maria Dubovitskaya
,
Ryo Nishimaki
Universally composable adaptive oblivious transfer (with access control) from standard assumptions.
Digital Identity Management
(2013)
Lujo Bauer
,
Cristian Bravo-Lillo
,
Elli Fragkaki
,
William Melicher
A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality.
Digital Identity Management
(2013)
Detlef Hühnlein
,
Jörg Schwenk
,
Tobias Wich
,
Vladislav Mladenov
,
Florian Feldmann
,
Andreas Mayer
,
Johannes Schmölz
,
Bud P. Bruegger
,
Moritz Horsch
Options for integrating eID and SAML.
Digital Identity Management
(2013)
Seung-Hyun Kim
,
Daeseon Choi
,
Seung-Hun Jin
,
Sung-Hoon Lee
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack.
Digital Identity Management
(2013)
Gergely Alpár
,
Jaap-Henk Hoepman
A secure channel for attribute-based credentials: [short paper].
Digital Identity Management
(2013)
Maarten H. Everts
,
Jaap-Henk Hoepman
,
Johanneke Siljee
UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography.
Digital Identity Management
(2013)
DIM'13, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013
Digital Identity Management
(2013)
Sacha Brostoff
,
Charlene Jennett
,
Miguel Malheiros
,
Martina Angela Sasse
Federated identity to access e-government services: are citizens ready for this?
Digital Identity Management
(2013)
Xin Jin
,
Ram Krishnan
,
Ravi S. Sandhu
Reachability analysis for role-based administration of attributes.
Digital Identity Management
(2013)
Liesbet van Zoonen
,
Georgina Turner
Taboos and desires of the UK public for identity management in the future: findings from two survey games.
Digital Identity Management
(2013)
Lilia Gomez Flores
,
Sandra Wilson
,
Dougie Kinnear
Probing identity management: preliminary findings.
Digital Identity Management
(2013)
Bian Yang
,
Christoph Busch
,
Julien Bringer
,
Els Kindt
,
Willem Ronald Belser
,
Uwe Seidel
,
Edward Springmann
,
Uwe Rabeler
,
Andreas Wolf
,
Magnar Aukrust
Towards standardizing trusted evidence of identity.
Digital Identity Management
(2013)
2011
Yuan Cao
,
Lin Yang
GISL: a generalized identity specification language based on XML schema.
Digital Identity Management
(2011)
Tarik Mustafic
,
Arik Messerman
,
Seyit Ahmet Çamtepe
,
Aubrey-Derrick Schmidt
,
Sahin Albayrak
Behavioral biometrics for persistent single sign-on.
Digital Identity Management
(2011)
Ronald Leenes
Who needs Facebook or Google+ anyway: privacy and sociality in social network sites.
Digital Identity Management
(2011)
W. Michael Petullo
,
Jon A. Solworth
Digital identity security architecture in Ethos.
Digital Identity Management
(2011)
DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA - October 21, 2011
Digital Identity Management
(2011)
Conor P. Cahill
,
Jason Martin
,
Matthew W. Pagano
,
Vinay Phegade
,
Anand Rajan
Client-based authentication technology: user-centric authentication using secure containers.
Digital Identity Management
(2011)
Sébastien Canard
,
Roch Lescuyer
Anonymous credentials from (indexed) aggregate signatures.
Digital Identity Management
(2011)
Kemal Bicakci
,
Nart Bedin Atalay
,
Hakan Ezgi Kiziloz
Johnny in internet café: user study and exploration of password autocomplete in web browsers.
Digital Identity Management
(2011)
Jörg Schwenk
,
Florian Kohlar
,
Marcus Amon
The power of recognition: secure single sign-on using TLS channel bindings.
Digital Identity Management
(2011)
Patrik Bichsel
,
Jan Camenisch
,
Franz-Stefan Preiss
A comprehensive framework enabling data-minimizing authentication.
Digital Identity Management
(2011)
David W. Chadwick
,
George Inman
,
Kristy W. S. Siu
,
Mohammad Sadek Ferdous
Leveraging social networks to gain access to organisational resources.
Digital Identity Management
(2011)
Jan Camenisch
Identity management tools for protecting online privacy.
Digital Identity Management
(2011)
2010
Antonio Fernandez Gómez-Skarmeta
,
Pedro Martinez-Julia
,
Joao Girão
,
Amardeo Sarma
Identity based architecture for secure communication in future internet.
Digital Identity Management
(2010)
Kevin Steuer Jr.
,
Ruchith Fernando
,
Elisa Bertino
Privacy preserving identity attribute verification in windows cardspace.
Digital Identity Management
(2010)
Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010
Digital Identity Management
(2010)
Seung-Hyun Kim
,
Daeseon Choi
,
Seung-Hun Jin
Gatekeeper: providing secure interoperability between mobile web-browser and local resources.
Digital Identity Management
(2010)
San-Tsai Sun
,
Kirstie Hawkey
,
Konstantin Beznosov
OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle.
Digital Identity Management
(2010)
Giovanni Di Crescenzo
,
Tao Zhang
Efficient CRL search in vehicular network PKIS.
Digital Identity Management
(2010)
Gregory Neven
Privacy-enhanced access control in primelife.
Digital Identity Management
(2010)
Maciej P. Machulak
,
Eve Maler
,
Domenico Catalano
,
Aad P. A. van Moorsel
User-managed access to web resources.
Digital Identity Management
(2010)
Eun-Ae Cho
,
Gabriel Ghinita
,
Elisa Bertino
Privacy-preserving similarity measurement for access control policies.
Digital Identity Management
(2010)
Yunsang Oh
,
Takashi Obi
,
Joong Sun Lee
,
Hiroyuki Suzuki
,
Nagaaki Ohyama
Empirical analysis of internet identity misuse: case study of south Korean real name system.
Digital Identity Management
(2010)