<--- Back to Details
First PageDocument Content
Computer access control / Computer security / Identity management / Federated identity / Cloud standards / OAuth / OpenID / Identity provider / Single sign-on / Authentication / Relying party / SAML-based products and services
Date: 2016-12-03 08:50:47
Computer access control
Computer security
Identity management
Federated identity
Cloud standards
OAuth
OpenID
Identity provider
Single sign-on
Authentication
Relying party
SAML-based products and services

UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs Marios Isaakidis Harry Halpin

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Download Document from Source Website

File Size: 239,02 KB

Share Document on Facebook

Similar Documents

Relying Party Agreement - versionThe Relying Party Agreement (RPA) below applies to certificates issued by KPN. However, the certificate that referred you to this page may have been issued by an organization with

Relying Party Agreement - versionThe Relying Party Agreement (RPA) below applies to certificates issued by KPN. However, the certificate that referred you to this page may have been issued by an organization with

DocID: 1qVCP - View Document

InCommon Certificate Service Relying Party Standard Form Agreement 24 JuneInCommon Certificate Service Relying Party Agreement

InCommon Certificate Service Relying Party Standard Form Agreement 24 JuneInCommon Certificate Service Relying Party Agreement

DocID: 1o83q - View Document

InCommon Certificate Service Relying Party Standard Form Agreement 24 JuneInCommon Certificate Service Relying Party Agreement

InCommon Certificate Service Relying Party Standard Form Agreement 24 JuneInCommon Certificate Service Relying Party Agreement

DocID: 1nO1O - View Document

seclab THE COMPUTER SECURITY GROUP AT UC SANTA BARBARA Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated

seclab THE COMPUTER SECURITY GROUP AT UC SANTA BARBARA Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated

DocID: 1mruh - View Document

Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel Yinzhi Cao† , Yan Shoshitaishvili‡ , Kevin Borgolte‡ , Chris

Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel Yinzhi Cao† , Yan Shoshitaishvili‡ , Kevin Borgolte‡ , Chris

DocID: 1m9zu - View Document