Identity

View this topic in
The properties of an entity that makes it definable and recognizable. (Wikipedia.org)






Conferences related to Identity

Back to Top

2020 International Symposium on Information Theory and Its Applications (ISITA)

The scope of the symposium includes all aspects of information theory and its applications. Itcovers a wide range of topics such as Shannon Theory, Coding Theory, and InformationSecurity as well as novel applications of information theory.

  • 2018 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.

  • 2016 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.

  • 2014 International Symposium on Information Theory and its Applications (ISITA)

    The ISITA symposium features world-class speakers, plenary talks and technical sessions on a diverse range of topics within the field of information theory Interested authors are invited to submit papers describing novel and previously unpublished results on topics in information theory and its applications, including, but not limited to: Error Control Coding, Coded Modulation, Communication Systems, Detection and EstimationSpread Spectrum Systems, Signal Processing, Rate-Distortion Theory, Stochastic Processes, Network Coding, Shannon Theory, Coding Theory and Practice, Data Compression and Source Coding, Data Storage, Mobile Communications, Pattern Recognition and Learning, Speech/Image Coding, Multi-Terminal Information Theory, Cryptography and Data Security, Applications of Information Theory, and Quantum Information Theory.

  • 2012 International Symposium on Information Theory and its Applications (ISITA)

    The scope of this symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Cryptology as well as novel applications of Information Theory.

  • 2010 International Symposium On Information Theory & Its Applications (Isita2010)

    The topics of interest include Error Control Coding, Coding Theory and Practice, Coded Modulation, Data Compression and Source Coding, Pattern Recognition and Learning, Speech/Image Coding, Rate-Distortion Theory, Shannon Theory, Stochastic Processes, Cryptology and Data Security, Data Networks, Multi-User Information Theory, Quantum Information Processing

  • 2008 International Symposium on Information Theory and its Applications (ISITA)

    The scope is Information theory and its Applications, e.g., error control coding, Coded Modulation, Cummunication systems, Detection and estimation, Spread spectrum systems, Signal processing, Rate-distortion theory, Stochastic processes, Data networks, Multi-user information theory, Coding theory and Practice, Data compression and Source coding, Optical communications, Mobile communications, Pattern recognition and learning, Speech/Image Coding, Shannon Theory, Cryptograph and Data Securi


2019 11th International Conference on Computational Intelligence and Communication Networks (CICN)

11th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to support intelligentsolutions for society. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication networks with the goal of exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will enhance collaboration across disciplines in order to support novel breakthroughs in the field.

  • 2018 10th International Conference on Computational Intelligence and Communication Networks (CICN)

    10th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation.

  • 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Image, Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• Digital Design, VLSI and SOC • Data Mining, Big data, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence • Power Electronics, Transmission and Power Systems • Computer Vision and Artificial Intelligence • Bio-informatics, Biometry and Medical Imaging• Information security,Network Security and Steganography • Remote sensing and GIS

  • 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN ? Sensors and networks (wireless ad hoc N/W, Vehicular N/W) ? Acoustic and under water electronics/communication and sonar systems ? Signal and Speach Processing ? Microwave IC, antennas and Wave Propagation ? Modeling and simulation ? VLSI Design and SOC ? Data Mining, Ontology and Web Services ? Parallel and distributed systems ? Telecommunication and Mobile communication ? Grid, Cloud, High Speed/Performance and Green Computing ? RFIDs and applicatons ? Embedded systems and Hardware Design/Implementation ? Mobile Computing, Computational Intelligence

  • 2015 International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• VLSI Design and SOC • Data Mining, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence

  • 2014 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN 2014) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation. The conference will provide an exceptional platform to the researchers to meet and discuss the utmost solutions, scientific results and methods in solving intriguing problems with people that actively involved in these evergreen fields. T

  • 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN)

    Topics

  • 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN)

    The lnternational Conference CICN 2012 aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary to brainstorm for fruitful results and applications.

  • 2011 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2011) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.

  • 2010 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2010) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.


2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2019 ACM/IEEE Joint Conference on Digital Libraries (JCDL)

JCDL encompasses the many meanings of the term "digital libraries", including (but not limited to) new forms of information institutions; operational information systems with all manner of digital content; new means of selecting, collecting, organizing, and distributing digital content; and theoretical models of information media, including document genres and electronic publishing. Digital libraries are distinguished from information retrieval systems because they include more types of media, provide additional functionality and services, and include other stages of the information life cycle, from creation through use. Digital libraries also can be viewed as a new form of information institution or as an extension of the services libraries currently provide.

  • 2018 ACM/IEEE Joint Conference on Digital Libraries (JCDL)

    JCDL encompasses the many meanings of the term "digital libraries", including (but not limited to) new forms of information institutions; operational information systems with all manner of digital content; new means of selecting, collecting, organizing, and distributing digital content; and theoretical models of information media, including document genres and electronic publishing. Digital libraries are distinguished from information retrieval systems because they include more types of media, provide additional functionality and services, and include other stages of the information life cycle, from creation through use. The intended community for this conference includes those interested in such aspects of digital libraries as infrastructure; institutions; metadata; content; services; digital preservation; system design; implementation; interface design; human-computer interaction; evaluation of performance; evaluation of usability; collection development; intellectual property etc.

  • 2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL)

    JCDL encompasses the many meanings of the term "digital libraries", including (but not limited to) new forms of information institutions; operational information systems with all manner of digital content; new means of selecting, collecting, organizing, and distributing digital content; and theoretical models of information media, including document genres and electronic publishing. Digital libraries are distinguished from information retrieval systems because they include more types of media, provide additional functionality and services, and include other stages of the information life cycle, from creation through use. The intended community for this conference includes those interested in such aspects of digital libraries as infrastructure; institutions; metadata; content; services; digital preservation; system design; implementation; interface design; human-computer interaction; evaluation of performance; evaluation of usability; collection development; intellectual property etc.

  • 2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL)

    The ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL) is a major international forum focusing on digital libraries and associated technical, practical, and social issues. Participation is sought from all parts of the world and from the full range of disciplines and professions involved in digital library research and practice, including computer science, information science, librarianship, archival science and practice, museum studies and practice, technology, medicine, social sciences, and humanities. Besides the main conference, JCDL 2016 will host specialized workshops, tutorials, panels, and a doctoral consortium. All domains - academics, government, industry, and others - are encouraged to participate as presenters or attendees.

  • 2015 IEEE/ACM Joint Conference on Digital Libraries (JCDL)

    The conference addresses the many interests around the topic of digital libraries, includinginformation seeking, digital preservation, information retrieval, hypertext and usability.

  • 2014 IEEE/ACM Joint Conference on Digital Libraries (JCDL)

    The conference addresses the many interests around the topic of digital libraries, including information seeking, digital preservation, information retrieval, hypertext and usability.

  • 2013 IEEE/ACM Joint Conference on Digital Libraries (JCDL)

    The ACM/IEEE Joint Conference on Digital Libraries (JCDL 2013) is a major international forum focusing on digital libraries and associated technical, practical, organizational, and social issues. JCDL encompasses the many meanings of the term digital libraries, including (but not limited to) new forms of information institutions and organizations; operational information systems with all manner of digital content; new means of selecting, collecting, organizing, distributing, and accessing digital content; theoretical models of information media, including document genres and electronic publishing; and theory and practice of use of managed content in science and education.

  • 2012 IEEE/ACM Joint Conference on Digital Libraries (JCDL)

    JCDL is an international forum focused on digital libraries and associated technical, practical, organizational, and social issues, including institutions and organizations; information systems; selecting, collecting, organizing, distributing, and accessing digital content; information media; electronic publishing; and the use of managed content in science and education.

  • 2011 IEEE/ACM Joint Conference on Digital Libraries (JCDL)

    The ACM/IEEE Joint Conference on Digital Libraries is a major international forum focusing on digital libraries and associated technical, practical, organizational, and social issues. JCDL encompasses the many meanings of the term "digital libraries", including (but not limited to) new forms of information institutions and organizations; operational information systems with all manner of digital content; new means of selecting, collecting, organizing, distributing, and accessing digital content; theoretical models of information media, including document genres and electronic publishing; and theory and practice of use of managed content in science and education.

  • 2009 IEEE/ACM 9th Joint Conference on Digital Libraries (JCDL)

    Since 2001, the Joint Conference on Digital Libraries has served as the major international forum focused on digital libraries and associated technical, practical, and social issues. JCDL encompasses the many meanings of the term "digital libraries," including (but not limited to) new forms of information institutions; operational information systems with all manner of digital content; new means of selecting, collecting, organizing, and distributing digital content; and theoretical models of information.

  • 2008 IEEE/ACM 8th Joint Conference on Digital Libraries (JCDL)

    Bridging-Culture, Bridging-Technology

  • 2007 IEEE/ACM 7th Joint Conference on Digital Libraries (JCDL)

  • 2006 IEEE/ACM 6th Joint Conference on Digital Libraries (JCDL)

  • 2005 IEEE/ACM 5th Joint Conference on Digital Libraries (JCDL)

  • 2004 IEEE/ACM 4th Joint Conference on Digital Libraries (JCDL)

  • 2003 IEEE/ACM 3rd Joint Conference on Digital Libraries (JCDL)

  • 2002 IEEE/ACM 2nd Joint Conference on Digital Libraries (JCDL)

  • 2001 IEEE/ACM 1st Joint Conference on Digital Libraries (JCDL)


2019 Chinese Control And Decision Conference (CCDC)

Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2018 Chinese Control And Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2017 29th Chinese Control And Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2016 Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create aforum for scientists, engineers and practitioners throughout the world to present the latestadvancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2015 27th Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2014 26th Chinese Control And Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create aforum for scientists, engineers and practitioners throughout the world to present the latestadvancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2013 25th Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2012 24th Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2011 23rd Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2010 Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies

  • 2009 Chinese Control and Decision Conference (CCDC)

    Chinese Control and Decision Conference is an annual international conference to create a forum for scientists, engineers and practitioners throughout the world to present the latest advancement in Control, Decision, Automation, Robotics and Emerging Technologies.

  • 2008 Chinese Control and Decision Conference (CCDC)


More Conferences

Periodicals related to Identity

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Antennas and Propagation, IEEE Transactions on

Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.


Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Circuits and Systems I: Regular Papers, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


More Periodicals

Most published Xplore authors for Identity

Back to Top

Xplore Articles related to Identity

Back to Top

Privacy Issues in Identity Verification

IEEE Security & Privacy, 2014

Identity verification plays an important role in creating trust in the economic system. It can, and should, be done in a way that doesn't decrease individual privacy. This article explores privacy issues in identity verification for commercial applications. It does not explore questions about when and to what degree identity verification is needed or address broader issues related to national ...


IEEE Approved Draft Standard for Identity-Based Cryptographic Techniques using Pairings

IEEE P1363.3/D8, April 2013, 2013

This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys and private keys. The purpose of this standard is to provide a reference for specifications of a variety of techniques from ...


IEEE Standard for Identity-Based Cryptographic Techniques using Pairings

IEEE P1363.3/D9, May 2013, 2013

Common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public- key encryption, and digital signatures, as well as cryptographic schemes based on those primitives are specified in this standard. Also, related cryptographic parameters, public keys and private keys, are specified. The purpose of this standard is to provide a reference for specifications of ...


IEEE Draft Standard for Identity-Based Cryptographic Techniques using Pairings

IEEE P1363/D6, December 2011, 2011

This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys and private keys. The purpose of this standard is to provide a reference for specifications of a variety of techniques from ...


Design identity system based on product identity and its case studies

2013 IEEE Tsinghua International Design Management Symposium, 2013

Brand identity plays an important role in the transforming and upgrading of OEM industry. This paper explores how to construct a brand identity by design approaches and design thinking, which includes product design identity, communication design identity, service design identity, and mind design identity, strategy design identity, behavior design identity. Further, aimed to original brand manufacture, a cake model of ...


More Xplore Articles

Educational Resources on Identity

Back to Top

IEEE-USA E-Books

  • Privacy Issues in Identity Verification

    Identity verification plays an important role in creating trust in the economic system. It can, and should, be done in a way that doesn't decrease individual privacy. This article explores privacy issues in identity verification for commercial applications. It does not explore questions about when and to what degree identity verification is needed or address broader issues related to national or other wide-scale identity systems.

  • IEEE Approved Draft Standard for Identity-Based Cryptographic Techniques using Pairings

    This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys and private keys. The purpose of this standard is to provide a reference for specifications of a variety of techniques from which applications may select.

  • IEEE Standard for Identity-Based Cryptographic Techniques using Pairings

    Common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public- key encryption, and digital signatures, as well as cryptographic schemes based on those primitives are specified in this standard. Also, related cryptographic parameters, public keys and private keys, are specified. The purpose of this standard is to provide a reference for specifications of a variety of techniques from which applications may select.

  • IEEE Draft Standard for Identity-Based Cryptographic Techniques using Pairings

    This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys and private keys. The purpose of this standard is to provide a reference for specifications of a variety of techniques from which applications may select.

  • Design identity system based on product identity and its case studies

    Brand identity plays an important role in the transforming and upgrading of OEM industry. This paper explores how to construct a brand identity by design approaches and design thinking, which includes product design identity, communication design identity, service design identity, and mind design identity, strategy design identity, behavior design identity. Further, aimed to original brand manufacture, a cake model of design identity is refined from three levels of product individual, product series/cluster and product brand, and three parts of product identity, communication identity and mind identity. In one case study of Sony, this paper analyses the communication designs, product designs and mind design in music players of Walkman, digital cameras of Cyber-shot, and mobile phone of Sony-Ericsson, so as to clarificate the relationship between brand identity and its sub-brand identity. In the other case study of Samsung, this paper analyses the product identity, communication identity and mind identity in mobile phone, digital camera and display, so as to explore how to unify different product categories into a single brand and fulfill its brand identity. And then some clues can be found to build brand identity from both multi-brand strategy and single-brand strategy, where mind identity is crucial and decisive. Finally, this paper rethinks the design identity system based on product identity in the new context.

  • US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem

    Personally Identifiable Information (PII) refers to any information that can be used to trace or identify an individual. A Javelin Strategy and Research Report stated that PII misuse and fraud hits record high with 15.4 million US victims in 2016, about 16% more than the previous year. A comprehensive analysis of PII attributes and their relationships is necessary to protect users from identity theft. However, identity theft and fraud are not just a US problem. According to a new report from Risk Based Security, in 2016, there were 4,149 confirmed breaches exposing more than 4.2 billion records globally. That is approximately 3.2 billion more records than were exposed in 2013, the previous all-time high. In this paper, we extend the mathematical representation and implementation model of the UT CID Identity Ecosystem representing PII attributes and relationships to incorporate international PII. Previously, the UT CID Identity Ecosystem model has been primarily populated using data about US theft and fraud cases to include PII attributes used to transact crime as well as accidental exposure of PII attributes. Statistics are also calculated and associated with respective PII attributes such as the frequency of exposure occurrences for respective PII attributes, monetization value of PII (i.e. financial consequences of the crime), and strength of relationships between PII attributes. This research describes how the content of the UT CID Identity Ecosystem and resulting analysis change when PII attributes from international identity theft and fraud cases are incorporated. Not only are the PII attributes different in an international UT CID Identity Ecosystem, the relationships between PII attributes change, the monetization value of PII attributes change, and the risk of exposure change when worldwide identity theft and fraud cases are considered.

  • Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes

    Personally Identifiable Information (PII) is commonly used in both the physical and cyber worlds to perform personal authentication. A 2014 Department of Justice report estimated that roughly 7% of American households reported some type of identity theft in the previous year, involving the theft and fraudulent use of such PII. Establishing a comprehensive map of PII attributes and their relationships is a fundamental first step to protect users from identity theft. In this paper, we present the mathematical representation and implementation of a model of Personally Identifiable Information attributes for people, named Identity Ecosystem. Each PII attribute (e.g., name, age, and Social Security Number) is modeled as a graph node. Probabilistic relationships between PII attributes are modeled as graph edges. We have implemented this Identity Ecosystem model as a Bayesian Belief Network (with cycles allowed) and we use Gibb's Sampling to approximate the posteriors in our model. We populated the model from two sources of information: 1) actual theft and fraud cases; and 2) experts' estimates. We have utilized our Identity Ecosystem implementation to predict as well as to explain the risk of losing PII and the liability associated with fraudulent use of these PII attributes. For better human understanding of the complex identity ecosystem, we also provide a 3D visualization of the Identity Ecosystem model and queries executed on the model. This research aims to advance a fundamental understanding of PII attributes and leads to better methods for preventing identity theft and fraud.

  • Research on the Design of Auxiliary Graphics in Visual Identity and Its Scalability

    As auxiliary graphics is of great importance in the visual identity system, in this paper, we study on how to utilize auxiliary graphics in visual identity and the corresponding scalability method. A complete corporate identity system is made up of mind identity, behavior identity, and visual identity. Particularly, visual identity refers to the visual recognition, and it is the static part of the CIS through the design of visual identification system. Furthermore, VI can convey the spirit of enterprise to users, and then establish the visual communication concept. Afterwards, we construct a visual identity elements database, which is made up of four components: 1) Visual identity elements warehouse in apparel design, 2) Fashion trends, 3) Brand position, and 4) New production development. Finally, we explain the scalability of auxiliary graphics in visual identity via analyzing its characteristics of three dimensional and dynamic forms.

  • Identity Data Security System for the Digital Identity Wallet

    In this paper, we propose identity data backup system for the digital Identity wallet (DIDW) that is a personal identity management system for the Internet. The DIDW is client side software that stores identity data such as personal profile and account (identifier and shared-secret) for logging on to the web sites that has been registered to. The DIDW provides ways of managing distributed identity data conveniently and securely. However, there is concern about loss/damage of the storage and misuse of lost data by malicious people who acquired it. The proposed system provides backup and recovery of the identity data. Suspending of the accounts is also provided for the case that it is assumed that the lost information is acquired by malicious people. The method for securely resuming suspended account and updating shared secret that is used in authentication is also provided.

  • Decoupling Identity Resolution from the Maintenance of Identity Information

    The EIIM model for ER allows for creation and maintenance of persistent entity identity structures. It accomplishes this through a collection of batch configurations that allow updates and asserted fixes to be made to the Identity knowledgebase (IKB). The model also provides a batch IR configuration that provides no maintenance activity but instead allows access to the identity information. This batch IR configuration is limited in a few ways. It is driven by the same rules used for maintaining the IKB, has no inherent method to identity "close" matches, and can only identify and return the positive matches. Through the decoupling of this configuration and its movements into an interactive role under the umbrella of an Identity Management Service, a more robust access method can be provided for the use of identity information. This more robust access to the information improved the quality of the information along multiple Information Quality dimensions.



Standards related to Identity

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...



Jobs related to Identity

Back to Top