Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Gergely Alpár"'
Publikováno v:
Lueks, W, Alpár, G, Hoepman, J-H & Vullers, P 2017, ' Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers ', Computers & Security, vol. 67, pp. 308-323 . https://doi.org/10.1016/j.cose.2016.11.018
Computers & Security, 67, 308-323
Computers & Security, 67, 308-323. Elsevier Advanced Technology
Computers & Security, 67, June, pp. 308-323
Computers & Security, 67, 308-323
Computers & Security, 67, 308-323. Elsevier Advanced Technology
Computers & Security, 67, June, pp. 308-323
Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking such credentials, which requires singling them out, is hard because it is at odds with anonymity. All revocation schemes proposed to date either sacrific
Autor:
Gergely Alpár, Brinda Hampiholi
Publikováno v:
PAC
PAC 2017: 2017 IEEE Symposium on Privacy-Aware Computing, Washington DC, DC, USA 1-3 August 2017. Proceedings, pp. 25-36
PAC 2017: 2017 IEEE Symposium on Privacy-Aware Computing, Washington DC, DC, USA 1-3 August 2017. Proceedings, 25-36. Los Alamitos : IEEE
STARTPAGE=25;ENDPAGE=36;TITLE=PAC 2017: 2017 IEEE Symposium on Privacy-Aware Computing, Washington DC, DC, USA 1-3 August 2017. Proceedings
PAC 2017: 2017 IEEE Symposium on Privacy-Aware Computing, Washington DC, DC, USA 1-3 August 2017. Proceedings, pp. 25-36
PAC 2017: 2017 IEEE Symposium on Privacy-Aware Computing, Washington DC, DC, USA 1-3 August 2017. Proceedings, 25-36. Los Alamitos : IEEE
STARTPAGE=25;ENDPAGE=36;TITLE=PAC 2017: 2017 IEEE Symposium on Privacy-Aware Computing, Washington DC, DC, USA 1-3 August 2017. Proceedings
Online shopping is one of the most important applications on the Internet and it is one that has been steadily growing over the last decade. With increasing numbers of online shopping transactions there are also raising concerns over privacy and prot
Autor:
Anna Krasnova, Iynkaran Natgunanathan, Antoine Guellier, Gergely Alpár, Lejla Batina, Lynn Batten, Veelasha Moonsamy
Publikováno v:
Conf. Computing Frontiers
The Internet of Things (IoT) is a ubiquitous system that incorporates not only the current Internet of computers, but also smart objects and sensors. IoT technologies often rely on centralised architectures that follow the current business models. Th
Autor:
Maarten H. Everts, Gergely Alpár
Publikováno v:
Hansen, M.; Hoepman, J.-H.; Leenes, R. (ed.), Privacy and Identity Management for Emerging Services and Technologies, pp. 237-247
IFIP Advances in Information and Communication Technology ISBN: 9783642551369
Privacy and Identity Management
IFIP Advances in Information and Communication Technology ISBN: 9783642551369
Privacy and Identity Management
Identity management is defined as the set of processes related to identity and access information for the whole identity life cycle in a system. In the open internet users need new methods for identity management that supply reliable authentication a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::97dfa8183b3f50fa24d81a0b3d707770
http://repository.ubn.ru.nl/handle/2066/127960
http://repository.ubn.ru.nl/handle/2066/127960
Autor:
Jaap-Henk Hoepman, Gergely Alpár
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642316678
PrimeLife
Camenisch, J. (ed.), Privacy and Identity Management for Life, pp. 261-273
IFIP Advances in Information and Communication Technology ; 375, 261-273. Boston : Springer
STARTPAGE=261;ENDPAGE=273;TITLE=IFIP Advances in Information and Communication Technology ; 375
PrimeLife
Camenisch, J. (ed.), Privacy and Identity Management for Life, pp. 261-273
IFIP Advances in Information and Communication Technology ; 375, 261-273. Boston : Springer
STARTPAGE=261;ENDPAGE=273;TITLE=IFIP Advances in Information and Communication Technology ; 375
An individual who intends to engage in sensitive transactions using a public terminal such as an ATM needs to trust that (a) all communications are indeed carried out with the intended terminal, (b) such communications are confidential, and (c) the t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::af6802a8690b6e70cae6d84ec7f957b8
https://doi.org/10.1007/978-3-642-31668-5_20
https://doi.org/10.1007/978-3-642-31668-5_20
Publikováno v:
ACM Computing Surveys. Aug2023, Vol. 55 Issue 8, p1-44. 44p.
Publikováno v:
ACM Transactions on Privacy & Security; Mar2022, Vol. 25 Issue 2, p1-36, 36p
Publikováno v:
ICT Systems Security & Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings; 2015, pI-XVI, 16p
Publikováno v:
Workshop on Digital Identity Management; 2013, p19-24, 6p
Autor:
Alpár, Gergely, Hoepman, Jaap-Henk
Publikováno v:
Workshop on Digital Identity Management; 2013, p13-18, 6p