Abstract Identity management is defined as the set of processes related to identity and access information for the whole identity life cycle in a system. In the open internet users need new methods for identity man-agement that supply reliable authentication and sufficient user control. Currently applied methods often lack a proper level of security (e.g., passwords) and privacy (e.g., diverse processing of personal data). A personal smart card and a personal smart phone can communicate using near-field communication (NFC). This allows users to apply their smart phone as a personal semi-trusted smart-card reader. For applica-tions such as authentication, this Trusted Couple can then be used in a secure and intuitive way, like a remote card ...
This paper takes a systematic approach to examining the basic concepts, the research issues and the ...
The increasing use of digital credentials undermines the owner's privacy. Anonymous credentials offe...
In this paper, we describe how security and privacy can be increased in user-centric Identity Manage...
Part 5: Identity and Identity ManagementInternational audienceIdentity management is defined as the ...
The widespread of Internet usage has resulted in a greater number and variety of applications involv...
Users increasingly use their mobile devices to communicate, to conduct business transaction and acce...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
Humans are smart when facing solely technical attacks; they invented technical strategies to defend ...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Part 3: Part IV: KeynotesInternational audienceIdentity management consists of the processes and all...
Smartphone devices have become an essential part of our daily activities for performing various esse...
Organizations today gather unprecedented quantities of data from their operations. This data is comi...
Typically, cloud computing has been embraced by businesses. However, this master thesis introduces t...
A solid mathematical model of identity and its related properties considering the mobility factor. ...
Identity management is a hot topic today for mobile network operators and service providers, especia...
This paper takes a systematic approach to examining the basic concepts, the research issues and the ...
The increasing use of digital credentials undermines the owner's privacy. Anonymous credentials offe...
In this paper, we describe how security and privacy can be increased in user-centric Identity Manage...
Part 5: Identity and Identity ManagementInternational audienceIdentity management is defined as the ...
The widespread of Internet usage has resulted in a greater number and variety of applications involv...
Users increasingly use their mobile devices to communicate, to conduct business transaction and acce...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
Humans are smart when facing solely technical attacks; they invented technical strategies to defend ...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Part 3: Part IV: KeynotesInternational audienceIdentity management consists of the processes and all...
Smartphone devices have become an essential part of our daily activities for performing various esse...
Organizations today gather unprecedented quantities of data from their operations. This data is comi...
Typically, cloud computing has been embraced by businesses. However, this master thesis introduces t...
A solid mathematical model of identity and its related properties considering the mobility factor. ...
Identity management is a hot topic today for mobile network operators and service providers, especia...
This paper takes a systematic approach to examining the basic concepts, the research issues and the ...
The increasing use of digital credentials undermines the owner's privacy. Anonymous credentials offe...
In this paper, we describe how security and privacy can be increased in user-centric Identity Manage...