Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Science of Computer Programming, 1993
IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second
Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '01, 2001
2008
The problem of identity theft, that is, the act of impersonating others' identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper we address such problem by proposing an approach to manage user identity attributes by assuring their privacy-preserving usage.
2009
Abstract To protect privacy in large systems, users should be able to authenticate against a central server without disclosing their identity to others. Private identification protocols based on public key cryptography are computationally expensive and cannot be implemented on small devices like RFID tags. Symmetric key protocols, on the other hand, provide only modest levels of privacy, but can be efficiently executed on servers and cheaply implemented on devices.
IEEE Transactions on Dependable and Secure Computing, 2000
Lecture Notes in Computer Science, 2000
VII Encuentro para la promoción y difusión del patrimonio inmaterial de países iberoamericanos Venezuela: Caracas, San Felipe, Octubre 17 al 22 de 2006, 2006
Études internationales, 2000
Презентация к докладу на конференции "Кислород и свободные радикалы", 2024
Studia Archaeologica et Linguistica. Miscellanea in honorem annos LXXV peragentis Professoris Adriani Poruciuc oblata , 2023
Arenal: Revista de Historia de las Mujeres, 2009
2009 IEEE International Conference on Systems, Man and Cybernetics, 2009
HSRA Publications, Bengaluru, 2023
Frontiers in Psychology
Educational Sciences Theory and Practice, 2012