Author:
Veeningen Meilof,de Weger Benne,Zannone Nicola
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference100 articles.
1. Identity Management Systems (IMS): Identification and comparison study. Technical report, Independent Centre for Privacy Protection Schleswig-Holstein (2003)
2. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL ’01), pp. 104–115. ACM (2001)
3. Alpár, G., Hoepman, J.H., Siljee, J.: The identity crisis: security, privacy and usability issues in identity management. eprint CoRR cs.CR:1101.0427 (2011)
4. Anderson, R.: Can we fix the security economics of federated authentication? In: Proceedings of the 19th International Workshop on Security Protocols (SPW ’11), LNCS 7114, pp. 25–32. Springer, Berlin (2011)
5. Arapinis, M., Chothia, T., Ritter, E., Ryan, M.: Analysing unlinkability and anonymity using the applied Pi calculus. In: Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium (CSF ’10), pp. 107–121. IEEE (2010)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献