Using Mobile Devices for User Authentication, Computer Networks, 17th Conference Proceedings. Volume 79 of Communications in Computer and Information Science, pp.263-268, 2010. ,
DOI : 10.1007/978-3-642-13861-4_27
Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities, 2008. ,
Beginning Information Cards and CardSpace: From Novice to Professional . Apress, 2007. ,
DOI : 10.1007/978-1-4302-0204-2
Using CardSpace as a Password Manager, Proceedings of IFIP IDMAN 2010 ? the second IFIP Conference on Policies and Research in Identity Management IFIP Advances in Information and Communication Technology, pp.18-30, 2010. ,
DOI : 10.1007/978-3-642-17303-5_2
URL : https://hal.archives-ouvertes.fr/hal-01054403
CardSpace-liberty integration for CardSpace users, Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST '10, pp.12-25, 2010. ,
DOI : 10.1145/1750389.1750392
A Guide to Using the Identity Selector Interoperability Profile V1.5 within Web Applications and Browsers. Microsoft Corporation, 2008. ,
Identity Metasystem Interoperability Version 1.0 (IMI 1.0), OASIS Standard, 2009. ,
Mobile Application Development with SMS and SIM Toolkit, 2002. ,
Mobile Messaging Technologies and Services SMS, EMS and MMS, 2003. ,
Implementing PassCard ? a CardSpace-based Password Manager, pp.2010-2025, 2010. ,
DOI : 10.1007/978-3-642-17303-5_2
Website Credential Storage and Two-Factor Web Authentication with a Java SIM, Proceedings, Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, pp.229-236, 2010. ,
DOI : 10.1007/978-3-540-85886-7_28
URL : https://hal.archives-ouvertes.fr/hal-01056084
Secure web authentication with mobile phones, DIMACS Workshop on Usable Privacy and Security Systems, 2004. ,
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), pp.57-66, 2006. ,
DOI : 10.1109/ACSAC.2006.23
Impostor: a single sign-on system for use from untrusted devices., IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.2191-2195, 2004. ,
DOI : 10.1109/GLOCOM.2004.1378398
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.5435
One-Time Password Access to Any Server without Changing the Server, Proceedings of the Information Security, 11th International Conference, pp.401-420, 2008. ,
DOI : 10.1007/978-3-540-85886-7_28
Web Proxy Servers, 1997. ,
Two factor authentication using mobile phones, 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp.641-644, 2009. ,
DOI : 10.1109/AICCSA.2009.5069395
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Lecture Notes in Computer Science, vol.4886, pp.88-103, 2007. ,
DOI : 10.1007/978-3-540-77366-5_11
A two-Factor Authentication System using Mobile Devices to Protect against Untrusted Public Computers, 2007. ,
Internet ID ? Flexible Re-use of Mobile Phone Authentication Security for Service Access, 2004. ,
Bridging CardSpace and Liberty Alliance with SIM authentication, Proceedings of the 10th International Conference on Intelligence in Next Generation Networks, pp.8-13, 2007. ,
Authentication model based bluetooth-enabled mobile phone, Journal of Computer Science, vol.1, issue.2, pp.200-203, 2005. ,