Author of the publication

Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems.

, , , and . Computer, 42 (5): 30-32 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Federated identity management for protecting users from ID theft., , and . Digital Identity Management, page 77-83. ACM, (2005)Certificate-less user authentication with consent., , and . Digital Identity Management, page 11-16. ACM, (2007)High-Performance Inverter Based on Shaft Acceleration Torque for AC Drives., , and . IEEE Trans. Ind. Electron., 60 (1): 66-77 (2013)Large-Scale Network-Traffic-Identification Method with Domain Adaptation., , , and . WWW (Companion Volume), page 109-110. ACM / IW3C2, (2020)A comparative study of structured and text-oriented analysis and design methodologies., , , and . J. Syst. Softw., 28 (1): 69-75 (1995)FieldCast: Peer-to-Peer Presence Information Exchange in Ubiquitous Computing Environment., , , and . IEICE Trans. Inf. Syst., 87-D (12): 2610-2617 (2004)RP2A: Rare Process-Pattern Analysis - Identifying Potential Problem Process-Patterns by Analyzing System Execution Data., , , and . APSEC, page 432-436. IEEE, (2022)SamE: Sampling-based Embedding for Learning Representations of the Internet., , , and . GLOBECOM, page 1-6. IEEE, (2021)Acceleration control of AC servo motor considering cogging torque at low velocities for haptics., , , and . ISIE, page 1668-1673. IEEE, (2012)Message from the IWSC 2015 Workshop Organizers., , , , and . COMPSAC Workshops, page 453. IEEE Computer Society, (2015)