نتایج جستجو برای: practical identity

تعداد نتایج: 347233  

Journal: :Journal of Computer Security 2008
Michael T. Goodrich Roberto Tamassia Danfeng Yao

We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary service, owned by a trusted third-party, to dynamically notarize assertions generated by identity providers. An additional feature of our model is the avoidance of direct communications between identity providers and servi...

2006
Michael T. Goodrich Roberto Tamassia Danfeng Yao

We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary service, owned by a trusted third-party, to dynamically notarize assertions generated by identity providers. An additional feature of our model is the avoidance of direct communications between identity providers and servi...

2013
Yang Tao

VANETs are the academic and industry research priorities in recent years. Security and privacy-preserving have become a bottleneck for VANETs’ future developing. There are few literatures about the architecture of VANETs privacy-protecting system. In this paper, we introduce a practical VANETs Privacy-Preserving System which aims to the prior location and identity privacy protecting. We propose...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1390

this thesis attempts to study the representations of the third-world intellectuals in three fictional works by the british-educated trinidadian nobel-winner v. s. naipaul: the mimic men, a bend in the river, and magic seeds. the first one recounts the story of ralph singh’s sense of alienation, his experiences as a colonial politician, and his struggle to give order to his disorderly world thro...

2017
Yuanyuan Shi Jianning Dang Wenwen Zheng Li Liu

Past work suggested that dual identity was effective to reduce prejudice. This study extended research on dual identity and prejudice by identifying a boundary condition in this relationship, that is, group permeability. In Study 1, we replicated previous studies with Chinese individuals and found that inducing dual identity (emphasizing subgroup differences and a common nation identity), compa...

2017
Sherry M. B. Thatcher David W. Wilson Susan A. Brown

Although prior literature has explored the important process of identity communication in faceto-face settings, significant changes in how work is accomplished in modern organizations require the development of new theory. Building on extensive identity research in non-virtual settings, this paper develops and justifies a new theoretical model that better explains the antecedents of virtual ide...

Journal: :IACR Cryptology ePrint Archive 2004
Dan Boneh Xavier Boyen

We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model in groups equipped with a bilinear map. Selective identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in the sta...

Journal: :Journal of adolescence 2016
Eleonora Ioana Pop Oana Negru-Subtirica Elisabetta Crocetti Adrian Opre Wim Meeus

The present three-wave longitudinal study provides empirical evidence for the mechanisms of the bright and dark sides of identity development in the academic context. First, we investigated the patterns of stability and change in educational identity and academic achievement among adolescents. Second, we examined the reciprocal associations between identity processes (i.e., commitment, in-depth...

2007
Wei Wu Yi Mu Willy Susilo Jennifer Seberry Xinyi Huang

A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Proxy signatures have found numerous practical applications such as distributed systems, mobile agent applications, etc. Recently, Xu, Zhang and Feng proposed the first formal models of identity based proxy signature. U...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید