Digital Identity Management 2015
DOI: 10.1016/b978-1-78548-004-1.50001-8
|View full text |Cite
|
Sign up to set email alerts
|

Digital Identity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 26 publications
0
11
0
1
Order By: Relevance
“…The sagacity of protecting identities obviously depends on context. In this sense, research on testing and identifying contexts for such protections constitutes an important avenue for future public management research (Laurent & Bouzefrane, 2015). Protections require a systemic approach and strict monitoring and enforcement.…”
Section: Discussionmentioning
confidence: 99%
“…The sagacity of protecting identities obviously depends on context. In this sense, research on testing and identifying contexts for such protections constitutes an important avenue for future public management research (Laurent & Bouzefrane, 2015). Protections require a systemic approach and strict monitoring and enforcement.…”
Section: Discussionmentioning
confidence: 99%
“…This authentication method is widely adopted since most online users have a Facebook or a Google account. However, with that method, identity providers were able to trace the users' activities and cross that information with identity data giving them a lot of confidential information 3 .…”
Section: Federated Identitymentioning
confidence: 99%
“…To account for all those changes, having an efficient management of Digital Identity (DI), and a better control of interactions have become a must. To be defined, a DI is a set of information that is used to represent an entity in the digital world [3]. This entity may be a person, organization, application, or even a device.…”
Section: Introductionmentioning
confidence: 99%
“…Laurent et al [4] stated about various digital techniques. Nimbhorkar and Malik [5] discussed only about key agreement protocol using ECC.…”
Section: Maintaining the Integrity Of The Specificationsmentioning
confidence: 99%
“…Zhang (1997) given procedure for Discrete Logarithms [3]. Kim (1997) given process for Discrete Logarithms [4]. Sun (1999) given method for Discrete Logarithms [5].…”
Section: History Of Various Proxy Signature Schemesmentioning
confidence: 99%