نتایج جستجو برای: practical identity
تعداد نتایج: 347233 فیلتر نتایج به سال:
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary service, owned by a trusted third-party, to dynamically notarize assertions generated by identity providers. An additional feature of our model is the avoidance of direct communications between identity providers and servi...
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary service, owned by a trusted third-party, to dynamically notarize assertions generated by identity providers. An additional feature of our model is the avoidance of direct communications between identity providers and servi...
VANETs are the academic and industry research priorities in recent years. Security and privacy-preserving have become a bottleneck for VANETs’ future developing. There are few literatures about the architecture of VANETs privacy-protecting system. In this paper, we introduce a practical VANETs Privacy-Preserving System which aims to the prior location and identity privacy protecting. We propose...
this thesis attempts to study the representations of the third-world intellectuals in three fictional works by the british-educated trinidadian nobel-winner v. s. naipaul: the mimic men, a bend in the river, and magic seeds. the first one recounts the story of ralph singh’s sense of alienation, his experiences as a colonial politician, and his struggle to give order to his disorderly world thro...
Past work suggested that dual identity was effective to reduce prejudice. This study extended research on dual identity and prejudice by identifying a boundary condition in this relationship, that is, group permeability. In Study 1, we replicated previous studies with Chinese individuals and found that inducing dual identity (emphasizing subgroup differences and a common nation identity), compa...
Although prior literature has explored the important process of identity communication in faceto-face settings, significant changes in how work is accomplished in modern organizations require the development of new theory. Building on extensive identity research in non-virtual settings, this paper develops and justifies a new theoretical model that better explains the antecedents of virtual ide...
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model in groups equipped with a bilinear map. Selective identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in the sta...
The present three-wave longitudinal study provides empirical evidence for the mechanisms of the bright and dark sides of identity development in the academic context. First, we investigated the patterns of stability and change in educational identity and academic achievement among adolescents. Second, we examined the reciprocal associations between identity processes (i.e., commitment, in-depth...
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Proxy signatures have found numerous practical applications such as distributed systems, mobile agent applications, etc. Recently, Xu, Zhang and Feng proposed the first formal models of identity based proxy signature. U...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید