نتایج جستجو برای: practical identity

تعداد نتایج: 347233  

Journal: :Inf. Soc. 2007
Edgar A. Whitley Ian Hosein Ian O. Angell Simon Davies

There is an increasing rhetoric from politicians for universities to become more involved in policy analysis and policy research. In this article, we reflect on our experiences of the analysis we conducted into the legislation to introduce biometric identity cards in the United Kingdom. We highlight how our work had direct consequences for the ongoing policy deliberation around this controversi...

2003
Hermann J. Künzel Joaquín Go

The central argument of the present study is that the performance of modern forensic speaker recognition can be improved by combining the strongholds of two entirely different approaches, that is: the classical acousticphonetic method and a potent automatic total-voice system such as IdentiVox. Since both make use of different and statistically independent sets of features of the phonetic and l...

Journal: :IACR Cryptology ePrint Archive 2006
Xavier Boyen Brent Waters

We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with small ciphertexts of size linear in the depth of the hierarchy. Applications include search on encrypted data...

2003
Jonathan Katz

Binary tree encryption (BTE), a relaxation of hierarchical identity-based encryption (HIBE), has recently emerged as a useful and intriguing primitive. On the one hand, the definition of security for BTE is sufficiently “weak” that — in contrast to HIBE — constructions of BTE in the standard model are known. On the other hand, BTE is sufficiently powerful that it yields a number of applications...

2008
Youdong Tao Yunhai Tong Shaohua Tan Shiwei Tang Dongqing Yang

Current privacy preserving methods in data publishing always remove the individually identifying attribute first and then generalize the quasi-identifier attributes. They cannot take the individually identifying attribute into account. In fact, tuples will become vulnerable in the situation of multiple tuples per individual. In this paper, we analyze the individually identifying attribute in th...

2009
Hristo Koshutanski Mihaela Ion Luigi Telesca

Digital Ecosystem is a new paradigm for dynamic IT business integration. Its main focus is to provide microand small enterprises with technological solutions bootstrapping their growth and cooperation. In a Digital Ecosystem, institutions compete in some business aspects and collaborate in others, and thus form stable and unstable coalitions. Such a dynamic environment becomes a bottleneck for ...

2006
Chunming Rong

We review briefly about identity-based encryption and decryption. In 1984 Adi Shamir requested a solution for a novel public-key encryption scheme, called identity-based encryption. The original motivation for identity-based encryption was to help the deployment of a public-key infrastructure. The idea of an identity-based encryption scheme is that the public key can be any arbitrary string, fo...

2007
Noëmi Manders-Huits Jeroen van den Hoven

Identity has become a central theme in modern philosophy. In this paper we are not concerned with the logic and metaphysics of identity, nor with questions of personal identity. We address a part of the ethics of identity in the light of ubiquitous modern technologies of identity management. In many practical contexts it is a 'forensic' and 'biographical' notion of identity and identification t...

2012
Alison Young Russell H. Fazio

Previous research on attitude accessibility has found that accessible attitudes influence both visual and cognitive attention. Smith, Fazio, and Cejka (1996), for instance, found that categories towards which we have accessible attitudes are more likely to be brought to mind when assessing a related object. Research in our lab (Young & Fazio, in prep) has found evidence that not only are catego...

2004
Chichun Lo Weili Lin Jay Wu

Internet services in distributive organization are normally built on an open network environment. In the environment internet service provisioning cannot be expected executing in a single close organization [1]. Identity management in cross-organization becomes an issue for handling Internet service and distributive business process. The “identity” in cross-organization web service is defined a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید