<--- Back to Details
First PageDocument Content
Identity management / Computer access control / Federated identity / Metadata standards / Identity assurance / SAML 2.0 / OpenID / Security Assertion Markup Language / Authentication / Identity provider / Privacy-enhancing technologies / Digital identity
Date: 2015-05-15 18:39:32
Identity management
Computer access control
Federated identity
Metadata standards
Identity assurance
SAML 2.0
OpenID
Security Assertion Markup Language
Authentication
Identity provider
Privacy-enhancing technologies
Digital identity

Toward Mending Two Nation-Scale Brokered Identification Systems

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Download Document from Source Website

File Size: 659,81 KB

Share Document on Facebook

Similar Documents

Cryptocurrencies / Alternative currencies / Bitcoin / Economy / Money / Finance / Blockchains / Digital currencies / CoinJoin / BitPay / Ethereum / RootStock

Proceedings on Privacy Enhancing Technologies ; ):179–199 Steven Goldfeder*, Harry Kalodner, Dillon Reisman, and Arvind Narayanan When the cookie meets the blockchain: Privacy risks of web payments via cryptocu

DocID: 1xVTb - View Document

Biology / Genetics / Genomics / Molecular biology / Biotechnology / DNA / Bioinformatics / Whole genome sequencing / Genome-wide association study / Single-nucleotide polymorphism / Human genome / Privacy

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective∗ Alexandros Mittos1 , Bradley Malin2 , Emiliano De Cristofaro1 arXiv:1712.02193v2 [cs.CR] 17 Aug 2018

DocID: 1xVkE - View Document

Cryptography / Public-key cryptography / Transport Layer Security / Cross-platform software / Internet protocols / Cryptographic protocols / Private information retrieval / XMPP / Forward secrecy / HTTPS / Email / WHOIS

Proceedings on Privacy Enhancing Technologies 2015; ):4–24 Nikita Borisov*, George Danezis*, and Ian Goldberg* DP5: A Private Presence Service Abstract: Users of social applications like to be notified

DocID: 1xURB - View Document

Internet privacy / Internet censorship / Computing / Digital rights / Information and communications technology / Internet security / Firewall software / Great Firewall / Proxy server / Deep packet inspection / Censorship / DNS hijacking

Proceedings on Privacy Enhancing Technologies ; ):37–61 Sheharbano Khattak*, Tariq Elahi*, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg SoK: Making Sense of Censorship Resistance Syst

DocID: 1xUDj - View Document

Computing / Routing / Network architecture / Data transmission / Wireless networking / Internet architecture / Packet forwarding / Internet Protocol / Onion routing / Dynamic Source Routing / MORE protocol

Proceedings on Privacy Enhancing Technologies ; ):1–18 Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

DocID: 1xUB6 - View Document