Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
.NET framework security
Overview of the AT&T Labs Trust-Management Project (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Revised Papers from the 8th International Workshop on Security Protocols
Security of Internet Location Management
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
The SPARTA pseudonym and authorization system
Science of Computer Programming
Hi-index | 0.00 |
In some instances, it may be possible to protect access to a user’s personal data by authorising the return addresses replies pertinent to that user are being sent to, rather than authenticating the principal making the request. This relationship between a user’s identity and authorised locations can offer a new design dimension when trying to improve privacy protection.