Pimenta et al., 2010
| Publication | Publication Date | Title |
|---|---|---|
| AU2017219140B2 (en) | Methods and systems for distributing cryptographic data to authenticated recipients | |
| US9300653B1 (en) | Delivery of authentication information to a RESTful service using token validation scheme | |
| US7926089B2 (en) | Router for managing trust relationships | |
| US8949963B2 (en) | Application identity design | |
| US10063523B2 (en) | Crafted identities | |
| Berbecaru et al. | Providing login and Wi-Fi access services with the eIDAS network: A practical approach | |
| US20170104748A1 (en) | System and method for managing network access with a certificate having soft expiration | |
| US20160212123A1 (en) | System and method for providing a certificate by way of a browser extension | |
| Cusack et al. | Evaluating single sign-on security failure in cloud services | |
| Chadwick et al. | Using the Internet to access confidential patient records: a case study | |
| Kiourtis et al. | Identity management standards: a literature review | |
| Bichsel et al. | An architecture for privacy-ABCs | |
| Dólera Tormo et al. | Identity management in cloud systems | |
| Hovav et al. | Tutorial: identity management systems and secured access control | |
| Marillonnet et al. | An Efficient User‐Centric Consent Management Design for Multiservices Platforms | |
| Pimenta et al. | GlobaliD-Privacy Concerns on a Federated Identity Provider Associated with the Users' National Citizen's Card | |
| Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
| Mukta | Privacy Preserving Identity and Credential Management: a blockchain-based solution | |
| Ranjbar et al. | Authentication and authorization for mobile devices | |
| Pimenta et al. | GlobaliD: Federated identity provider associated with national citizen's card | |
| Al-Sinani et al. | Client-based cardspace-openid interoperation | |
| Carbone et al. | Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report | |
| James | Web single sign-on systems | |
| Paul et al. | UI Component and Authentication | |
| Rexha et al. | Using eID Pseudonymity and Anonymity for Strengthening User Freedom in Internet |