Authentication: from passwords to public keys
Authentication: from passwords to public keys
Voice over IP - Considerations for a Next Generation Architecture
EUROMICRO '05 Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications
Complex federation architectures: stakes, tricks & issues
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Knowledge-based platform for eGovernment agents: A Web-based solution using semantic technologies
Expert Systems with Applications: An International Journal
Interoperability and anonymity for ID management systems
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
A taxonomy of single sign-on systems
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Secured web services based on extended usage control
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Towards privacy-enhancing identity management in mashup-providing platforms
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Key techniques research on water resources scientific data sharing platform
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part II
A multipurpose delegation proxy for WWW credentials
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
An empirical study on the usability of logout in a single sign-on system
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A case study of semantic solutions for citizen-centered web portals in egovernment: the Tecut portal
EGOV'07 Proceedings of the 6th international conference on Electronic Government
A hybrid approach for highly available and secure storage of Pseudo-SSO credentials
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Hi-index | 0.00 |