understanding the importance and impact of anonymity and authentication in a networked society
navigation menu top border
navigation menu bottom border
left side navigation top border

left side navigation bottom border

left side navigation top border
left side navigation top border

main display area top border
PDF Print

On the Identity Trail's Focus on Authentication:

 Contested Identities or Controversial Medium? Authentication and YouTube.com
By: Patrick Derby
February 6, 2007

By: Stefan Brands
To be submitted to major new privacy encylcopedia.

On the Identity Trail: Anonymity and Authentication in a Networked Society
By: Ian Kerr
Presented at the PRIME Meeting of the Social Scientific Research Working Group at the Tilburg Institute for Law, Technology, and Society, Tilburg University, The Netherlands, on November 25, 2005. 

Pass-thoughts: Authenticating With Our Minds
By: J. Thorpe, P.C. van Oorschot, A. Somayaji
In Cryptology ePrint Archive: Report 2005/121 (eprint.iacr.org) http://eprint.iacr.org/2005/121. Revised version (to appear): ACSA 2005 New Security Paradigms Workshop, Sept. 2005, Lake Arrowhead, California.

Non-Intrusive Cross-Domain Digital Identity Management
By: Stephan Brands
Proceedings of the 3rd Annual PKI R&D Workshop in Gaithersburg, April 2004.

On E-Government Authentication and Privacy
By: Stefan Brands

This message will self-destruct in five seconds
By: Ian Goldberg

main display area bottom border

.:privacy:. | .:contact:. | .:1rxdrugs.net:.

This is a SSHRC funded project:
Social Sciences and Humanities Research Council of Canada

© 2014 On the Identity Trail
Joomla! is Free Software released under the GNU/GPL License.