![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 95 matches
- 2013
- Masayuki Abe, Jan Camenisch, Maria Dubovitskaya, Ryo Nishimaki:
Universally composable adaptive oblivious transfer (with access control) from standard assumptions. Digital Identity Management 2013: 1-12 - Gergely Alpár, Jaap-Henk Hoepman:
A secure channel for attribute-based credentials: [short paper]. Digital Identity Management 2013: 13-18 - Lujo Bauer
, Cristian Bravo-Lillo
, Elli Fragkaki, William Melicher:
A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality. Digital Identity Management 2013: 25-36 - Sacha Brostoff, Charlene Jennett, Miguel Malheiros, Martina Angela Sasse:
Federated identity to access e-government services: are citizens ready for this? Digital Identity Management 2013: 97-108 - Maarten H. Everts, Jaap-Henk Hoepman, Johanneke Siljee:
UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography. Digital Identity Management 2013: 19-24 - Lilia Gomez Flores, Sandra Wilson, Dougie Kinnear:
Probing identity management: preliminary findings. Digital Identity Management 2013: 45-50 - Detlef Hühnlein, Jörg Schwenk, Tobias Wich, Vladislav Mladenov, Florian Feldmann, Andreas Mayer, Johannes Schmölz, Bud P. Bruegger, Moritz Horsch:
Options for integrating eID and SAML. Digital Identity Management 2013: 85-96 - Xin Jin, Ram Krishnan, Ravi S. Sandhu:
Reachability analysis for role-based administration of attributes. Digital Identity Management 2013: 73-84 - Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Sung-Hoon Lee
:
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack. Digital Identity Management 2013: 51-62 - Bian Yang, Christoph Busch, Julien Bringer, Els Kindt, Willem Ronald Belser, Uwe Seidel, Edward Springmann, Uwe Rabeler, Andreas Wolf, Magnar Aukrust:
Towards standardizing trusted evidence of identity. Digital Identity Management 2013: 63-72 - Liesbet van Zoonen, Georgina Turner:
Taboos and desires of the UK public for identity management in the future: findings from two survey games. Digital Identity Management 2013: 37-44 - Thomas Groß, Marit Hansen:
DIM'13, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013. ACM 2013, ISBN 978-1-4503-2493-9 [contents] - 2011
- Kemal Bicakci
, Nart Bedin Atalay, Hakan Ezgi Kiziloz
:
Johnny in internet café: user study and exploration of password autocomplete in web browsers. Digital Identity Management 2011: 33-42 - Patrik Bichsel, Jan Camenisch, Franz-Stefan Preiss:
A comprehensive framework enabling data-minimizing authentication. Digital Identity Management 2011: 13-22 - Conor P. Cahill, Jason Martin, Matthew W. Pagano, Vinay Phegade, Anand Rajan:
Client-based authentication technology: user-centric authentication using secure containers. Digital Identity Management 2011: 83-92 - Jan Camenisch:
Identity management tools for protecting online privacy. Digital Identity Management 2011: 1-2 - Sébastien Canard, Roch Lescuyer:
Anonymous credentials from (indexed) aggregate signatures. Digital Identity Management 2011: 53-62 - Yuan Cao, Lin Yang:
GISL: a generalized identity specification language based on XML schema. Digital Identity Management 2011: 3-12 - David W. Chadwick
, George Inman, Kristy W. S. Siu, Mohammad Sadek Ferdous
:
Leveraging social networks to gain access to organisational resources. Digital Identity Management 2011: 43-52 - Ronald Leenes:
Who needs Facebook or Google+ anyway: privacy and sociality in social network sites. Digital Identity Management 2011: 31-32 - Tarik Mustafic, Arik Messerman, Seyit Ahmet Çamtepe
, Aubrey-Derrick Schmidt, Sahin Albayrak
:
Behavioral biometrics for persistent single sign-on. Digital Identity Management 2011: 73-82 - W. Michael Petullo, Jon A. Solworth:
Digital identity security architecture in Ethos. Digital Identity Management 2011: 23-30 - Jörg Schwenk, Florian Kohlar, Marcus Amon:
The power of recognition: secure single sign-on using TLS channel bindings. Digital Identity Management 2011: 63-72 - Abhilasha Bhargav-Spantzel, Thomas Groß:
DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA - October 21, 2011. ACM 2011, ISBN 978-1-4503-1006-2 [contents] - 2010
- Eun-Ae Cho, Gabriel Ghinita, Elisa Bertino:
Privacy-preserving similarity measurement for access control policies. Digital Identity Management 2010: 3-12 - Giovanni Di Crescenzo, Tao Zhang:
Efficient CRL search in vehicular network PKIS. Digital Identity Management 2010: 17-26 - Antonio Fernandez Gómez-Skarmeta, Pedro Martinez-Julia, Joao Girão, Amardeo Sarma:
Identity based architecture for secure communication in future internet. Digital Identity Management 2010: 45-48 - Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin:
Gatekeeper: providing secure interoperability between mobile web-browser and local resources. Digital Identity Management 2010: 59-62 - Maciej P. Machulak, Eve Maler, Domenico Catalano, Aad P. A. van Moorsel:
User-managed access to web resources. Digital Identity Management 2010: 35-44 - Gregory Neven:
Privacy-enhanced access control in primelife. Digital Identity Management 2010: 1-2
skipping 65 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-05 08:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint