"First IFIP WG 11.6 Working Conference on Policies and Research in Identity
Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands
, October 11-12, 2007 Elisabeth de Leeuw, Simone Fischer-Hübner, Jimmy C.
Tseng, John Borking. One advantage of this approach is that the central secret –
the user's private key – is actually stored on the smart card and not directly
dependent upon a user chosen password. Guessing the P ..."
"st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy ..."
"The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Each communication exchange contains an identifier which may, or may not, be intended by the parties involved. What constitutes an identity, how do new technologies affect identity, how do ..."
"This volume is the first in a projected series devoted to the mathematical and philosophical works of the late Claude Chevalley. It covers the main contributions by the author to the theory of spinors. Since its appearance in 1954, "The Algebraic Theory of Spinors" has been a much sought after reference. It presents the whole story of one subject in a concise and especially clear manner. The reprint of the book is supplemented by a seri ..."
"st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy ..."
"The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. Each communication exchange contains an identifier which may, or may not, be intended by the parties involved. What constitutes an identity, how do new technologies affect identity, how do ..."
"This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments". The papers presented here place a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detec ..."
"10. 12. 13. 14. 15. 16. M. Anisetti, V. Bellandi, E. Damiani, M. Montel, and S.
Reale. Open Source Electromagnetic Field Monitoring as e-Government Service.
Proc. of the International Symposium on Telecommunications, Shiraz, Iran,
September 2005. . M. Anisetti, V. Bellandi, E. Damiani, and S. Reale, Localize
and tracking of mobile antenna in urban environment. Proc. of the International
Symposium on Telecommunications, Shiraz, Iran ..."
"52 Bernd Carsten Stahl Workshop Papers Smart Cars Cruising on the Road
Paved with Good Intentions? – Workshop on Big Data Applications and
Individual Rights Under the New European General Data Protection Regulation .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Felix Bieker, Barbara Büttner, and Murat
Karaboga Opportunities and Challenges of CREDENTIAL: Towards a Metadata-
Privacy Respecting Identity Provider . . . . ..."
"The Dynamic Attribute Provider checks the user ALOC policies and accordingly
builds the set of requested attributes from the Attribute Repository. 3. The
Dynamic Attribute Provider returns the set of dynamic attributes to the Attribute
Token Service to issue a token. 4. The Attribute Token Service creates a token, in
the requested format, which contains the set of dynamic attributes and sends it to
the SP. 5. Upon receipt, the Attr ..."
"This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016.The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a ..."
"This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide ..."
"This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016.The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a ..."
"This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide ..."
"In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (
eds.) SEC 2014. ... Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-
642-55415-5_38 Kitchin, R.: The Data Revolution. Big Data, Open Data, ...
CreateSpace Independent Publishing Platform Rommetveit, K., Van Dijk, N.,
Gunnarsdottír ..."
"... Jo Pierson, Daniel Slamanig, Simone Fischer-Hübner, Stephan Krenn. Sharing
Is Caring, a Boundary Object Approach to Mapping and Discussing Personal
Data Processing Rob Heyman(&) imec-SMIT, Vrije Universiteit Brussel, Pleinlaan
..."
"14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017,
Proceedings Javier Lopez, Simone Fischer-Hübner, Costas Lambrinoudakis. We
now formally describe the fuzzy search approach in [12]. Locality Sensitive
Hashing. Locality sensitive hashing (LSH) is used to efficiently approximate
distances between two terms. Let M be a metric space with distance function d :
M → R. A family H of hash functions h : M → S i ..."
IFIP Advances in Information and Communication Technology Privacy and Identity Management for the Future Internet in the Age of Globalisation : 9th IFIP WG 9. 2, 9. 5, 9. 6/11. 7, 11. 4, 11. 6/SIG 9. 2. 2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers 457 by Jan Camenisch, Simone Fischer-Hübner, Marit Hansen 267 Pages, Published 2015 by Springer ISBN-13: 978-3-319-18621-4, ISBN: 3-319-18621-3
"Secur. 42, 1–12 (2014) Cavoukian, A., Stoianov, A.: Biometric encryption. In: van
Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp.
90–98. Springer, US (2011) Sutcu, Y., Li, Q., Memon, N.: Secure sketches for
protecting biometric templates. In: Campisi, P. (ed.) Security and Privacy in
Biometrics, pp. 69–104. Springer, London (2013) Breebaart, J., Yang, B., Buhan-
Dulman, I., Busch, C.: Biometric tem ..."