Showing 1 - 20 results of 23 for search '"digital credential"', query time: 2.54s Refine Results
  1. 1
    by Fan, Jinnan
    Published 2019
    Subjects: ...Digital credentials...
    Get full text
    Get full text
    Others
  2. 2
    by Kou-Chen Wu, 吳國禎
    Published 1999
    ... digital credentials which mimic the paper counterparts should be provided to support these security...
    Get full text
    Others
  3. 3
  4. 4
  5. 5
  6. 6
    Published 2020
    Subjects: ...Alternative Digital Credentials...
    Get fulltext
    eBook
  7. 7
    Published 2020
    Subjects: ...Alternative Digital Credentials...
    Open Access: DOAB: description of the publication
    Open Access: DOAB, download the publication
    eBook
  8. 8
    by Bissessar, David
    Published 2013
    ... into Brands’ Digital Credential scheme, and the Anonymous Credentials scheme of Camenisch and Lysyanskaya. We...
    Get full text
  9. 9
    by Bissessar, David
    Published 2013
    ... into Brands’ Digital Credential scheme, and the Anonymous Credentials scheme of Camenisch and Lysyanskaya. We...
    Get full text
  10. 10
    by Bissessar, David
    Published 2013
    ... into Brands’ Digital Credential scheme, and the Anonymous Credentials scheme of Camenisch and Lysyanskaya. We...
    Get full text
    Get full text
  11. 11
    by Chien-Hua Tsai, Pin-Chang Su
    Published 2017-01-01
    ... and interaction patterns, such as e-contract negotiations, e-payment services, or digital credential processes...
    Get full text
    Article
  12. 12
    by Bauer, David Allen
    Published 2010
    ..., redactable, digital credentials that allow certified personal attributes to safely be used to provide...
    Get full text
  13. 13
    by Morris, Cameron
    Published 2006
    ... to the digital credentials thateach other possesses. Traditionally, trust negotiation uses certificates...
    Get full text
    Get full text
    Others
  14. 14
    by Carrara, Brent
    Published 2013
    ...In this work, we study the use of digital credentials in an online digital identity management...
    Get full text
    Get full text
    Others
  15. 15
    by Jen-Chun Hsu, 許任鈞
    Published 2013
    ... credentials are used with increasing frequency. Today users employing digital credentials not only com- plete...
    Get full text
    Others
  16. 16
    by Van Der Horst, Timothy W.
    Published 2005
    ...Digital credentials enable users to perform secure interactions by proving either their identity...
    Get full text
    Get full text
    Others
  17. 17
  18. 18
    by Chan, Fuk-Wing Thomas
    Published 2004
    ... trust through the gradual disclosure of digital credentials and access control policies. Previous...
    Get full text
    Get full text
    Others
  19. 19
    ... they complement other forms of digital credentials, the ease of integration to existing administrative records...
    Get full text
    Article
  20. 20
    by Smith, Bryan J.
    Published 2004
    ... relationship through the iterative disclosure of digital credentials. One approach to negotiating trust...
    Get full text
    Get full text
    Others