Constructing robust digital identity infrastructure for future networked society
暂无分享,去创建一个
Xiaodi Huang | Qun Jin | Jianming Yong | Sanjib Tiwari | J. Yong | Qun Jin | Sanjib Tiwari | Xiaodi Huang
[1] Hal Berghel,et al. Identity theft, social security numbers, and the Web , 2000, CACM.
[2] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[3] P. Thompson. Digital Identity , 2003 .
[4] Rebecca T. Mercuri. Scoping identity theft , 2006, CACM.
[5] Elisa Bertino,et al. Receipt management- transaction history based trust establishment , 2007, DIM '07.
[6] Elisa Bertino,et al. Replacing Lost or Stolen E-Passports , 2007, Computer.
[7] Joon Koh,et al. Encouraging participation in virtual communities , 2007, CACM.
[8] Marco Casassa Mont,et al. On identity assurance in the presence of federated identity management systems , 2007, DIM '07.
[9] E. Bertino. Digital Identity Protection-Concepts and Issues , 2009 .
[10] Junzhou Luo,et al. A trust degree based access control in grid environments , 2009, Inf. Sci..