최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE access : practical research, open solutions, v.9, 2021년, pp.22894 - 22913
Kim, Bong Gon (Stony Brook University, Stony Brook, NY, USA) , Cho, Young-Seob (Electronics and Telecommunications Research Institute, Daejeon, South Korea) , Kim, Seok-Hyun (Electronics and Telecommunications Research Institute, Daejeon, South Korea) , Kim, Hyoungshick (Sungkyunkwan University, Suwon, South Korea) , Woo, Simon S. (Sungkyunkwan University, Suwon, South Korea)
Decentralized identifiers (DID) has shown great potential for sharing user identities across different domains and services without compromising user privacy. DID is designed to enable the minimum disclosure of the proof from a user’s credentials on a need-to-know basis with a contextualized ...
Tompa, Martin, Woll, Heather. How to share a secret with cheaters. Journal of cryptology : the journal of the International Association for Cryptologic Research, vol.1, no.3, 133-138.
RFC6840 Clarifications and Implementation Notes for DNS Security (DNSSEC) weiler 2013
Decentralized Identifier Resolution (Did Resolution) V0 2 2020
Crypto Obfuscator For Net (V2020) 2020
Huaqun Wang, Futai Zhang, Yanfei Sun. Cryptanalysis of a Generalized Ring Signature Scheme. IEEE transactions on dependable and secure computing, vol.6, no.2, 149-151.
arXiv 1808 06254 SABRE: Protecting bitcoin against routing attacks apostolaki 2018
Proc IEEE InfoCom Enhancing cache robustness for content-centric networking xie 2012 2426
Wallet Query Language 2020
Walkthrough India 2020
Did Documents 2020
SOFSEM Formal analysis of Facebook connect single sign-on authentication protocol miculan 2011 11 22
Verifiable Data Registry 2020
Hyperledger Ursa Explainer 2020
Hyperledger Aries Explainer 2020
Meet Connect Me the First Sovrin-Based Digital Wallet 2020
Microservice Architecture Aligning Principles Practices and Culture nadareishvili 2016
Server-Side Request Forgery (SSRF) 2020
Proc IEEE Eur Symp Secur Privacy (EuroS P) Redactable blockchain–or–rewriting history in bitcoin and friends ateniese 2017 111
RADIUS Securing Public Access to Private Resources hassell 2002
Brassard, G., Chaum, D., Crepeau, C.. Minimum disclosure proofs of knowledge. Journal of computer and system sciences, vol.37, no.2, 156-189.
Proc Project Athena Tech Plan Kerberos authentication and authorization system miller 1988
Chameleon hashing and signatures krawczyk 1998
SAML: The secret to centralized identity management simon 2004
arXiv 1904 03487 Exploring the attack surface of blockchain: A systematic overview saad 2019
The Path to Self-Sovereign Identity allen 2020
Kim, Eunsoo, Cho, Young-Seob, Kim, Bedeuro, Ji, Woojoong, Kim, Seok-Hyun, Woo, Simon S., Kim, Hyoungshick. Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?. IEEE internet of things magazine, vol.3, no.4, 82-87.
Art 4 GDPR Definitions 2020
Eisenstadt, Marc, Ramachandran, Manoharan, Chowdhury, Niaz, Third, Allan, Domingue, John. COVID-19 Antibody Test/Vaccination Certification: There's an App for That. IEEE open journal of engineering in medicine and biology, vol.1, 148-155.
Peer DID Method 1 0 Specification 2020
Enhancing the privacy of decentralized identifiers with ring signatures biswas 2020
Part of the Original Why i wrote PGP zimmermann 1991 1
Mediators and Relays 2020
Cross-Domain Messaging 2020
Tourani, Reza, Misra, Satyajayant, Mick, Travis, Panwar, Gaurav. Security, Privacy, and Access Control in Information-Centric Networking: A Survey. IEEE Communications surveys and tutorials, vol.20, no.1, 566-600.
Cory Wright's blog Understanding kaminsky’s dns bug wright 2008
Decentralized Identifier Resolution (Did Resolution) V0 2 2020
Proc APWG Symp Electron Crime Res (eCrime) Inside a phisher’s mind: Understanding the anti-phishing ecosystem through phishing kit analysis oest 2018 1
Do, Q., Martini, B., Choo, K.K.R.. Exfiltrating data from Android devices. Computers & security, vol.48, 74-91.
Smali/Baksmali Explainer gruver 2020
Conti, Mauro, Dragoni, Nicola, Lesyk, Viktor. A Survey of Man In The Middle Attacks. IEEE Communications surveys and tutorials, vol.18, no.3, 2027-2051.
Decentralized identifiers (DIDs) v1 0 Core architecture data model and representations reed 2020
Proc Surveill Cultures A Global Surveill Soc A critical review of 10 years of privacy technology danezis 2010 1
Verifiable credentials data model 1 0 Expressing verifiable information on the web 2020
Aries RFC 0004 Agents 2020
DKMS (Decentralized Key Management System) Design and Architecture V4 reed 2020
Aries RFC 0005 Did Communication hardman 2020
Universal Resolver 2020
Implementing Threshold Schemes sprenkels 2020
Karami, A., Guerrero-Zapata, M.. An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking. Computer networks, vol.80, 51-65.
Proc Int Conf Wireless Netw (ICWN) Implementation and performance analysis of PBKDF2, Bcrypt, Scrypt algorithms ertaul 2016 66
Shamir’s Secret-Sharing for Mnemonic Codes 2020
Proc Annu Cryptol Conf Cryptographic extraction and key derivation: The HKDF scheme krawczyk 2010 631
A Protocol and Token for SelfSovereign Identity and Decentralized Trust 2020
Microsoft Corp The laws of identity cameron 2005 5 8
A Decentralized Open Source Solution for Digital Identity and Access Management 2020
Uport Specs 2020
Decentralized identity and access management framework for Internet of Things devices omar 2020
Blind Trust Before Verification gultsch 2020
Shamir, Adi. How to share a secret. Communications of the ACM, vol.22, no.11, 612-613.
Trust on First Use 2020
Did Exchange Protocol 1 0 2020
Input Metadata Properties 2020
Proc IEEE Secur Privacy The provable security of ed25519: Theory and practice brendel 2020 1
Did Url Dereferencing 2020
Did Url Syntax 2020
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.