


default search action
Digital Identity Management 2011: Chicago, Illinois, USA
- Abhilasha Bhargav-Spantzel, Thomas Groß:
DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA - October 21, 2011. ACM 2011, ISBN 978-1-4503-1006-2
Keynote address
- Jan Camenisch:
Identity management tools for protecting online privacy. 1-2
Policy and framework
- Yuan Cao, Lin Yang:
GISL: a generalized identity specification language based on XML schema. 3-12 - Patrik Bichsel, Jan Camenisch, Franz-Stefan Preiss:
A comprehensive framework enabling data-minimizing authentication. 13-22 - W. Michael Petullo, Jon A. Solworth:
Digital identity security architecture in Ethos. 23-30
Keynote address
- Ronald Leenes:
Who needs Facebook or Google+ anyway: privacy and sociality in social network sites. 31-32
Usability and social networks
- Kemal Bicakci
, Nart Bedin Atalay, Hakan Ezgi Kiziloz
:
Johnny in internet café: user study and exploration of password autocomplete in web browsers. 33-42 - David W. Chadwick
, George Inman, Kristy W. S. Siu, Mohammad Sadek Ferdous
:
Leveraging social networks to gain access to organisational resources. 43-52
Cryptography
- Sébastien Canard, Roch Lescuyer:
Anonymous credentials from (indexed) aggregate signatures. 53-62 - Jörg Schwenk, Florian Kohlar, Marcus Amon:
The power of recognition: secure single sign-on using TLS channel bindings. 63-72
Biometrics and authentication
- Tarik Mustafic, Arik Messerman, Seyit Ahmet Çamtepe
, Aubrey-Derrick Schmidt, Sahin Albayrak
:
Behavioral biometrics for persistent single sign-on. 73-82 - Conor P. Cahill, Jason Martin, Matthew W. Pagano, Vinay Phegade, Anand Rajan:
Client-based authentication technology: user-centric authentication using secure containers. 83-92

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.