Conferences related to Identity management systems

Back to Top

2020 IEEE International Conference on Consumer Electronics (ICCE)

The International Conference on Consumer Electronics (ICCE) is soliciting technical papersfor oral and poster presentation at ICCE 2018. ICCE has a strong conference history coupledwith a tradition of attracting leading authors and delegates from around the world.Papers reporting new developments in all areas of consumer electronics are invited. Topics around the major theme will be the content ofspecial sessions and tutorials.


2020 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)

All topics related to engineering and technology management, including applicable analytical methods and economical/social/human issues to be considered in making engineering decisions.


2020 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)

The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICC 2020 - 2020 IEEE International Conference on Communications

All topics relating to existing and emerging communications networking technologies.


More Conferences

Periodicals related to Identity management systems

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


More Periodicals

Most published Xplore authors for Identity management systems

Back to Top

Xplore Articles related to Identity management systems

Back to Top

Introduction of the Content ID Forum (cIDf)

Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 2002

To realize various applications for content distribution via networks, the unique content identifier (Content ID) is indispensable. It can be used for negotiating secondary content use, automatic royalty sharing, content search and exchange, and illegal use detection. In August 1999, responding to a call from Prof. Dr. Hiroshi Yasuda at Univ of Tokyo, the Content ID Forum (cIDf) was established ...


A group signature scheme with revocation

Proceedings EC-VIP-MC 2003. 4th EURASIP Conference focused on Video/Image Processing and Multimedia Communications (IEEE Cat. No.03EX667), 2003

A group signature scheme allows any group member to sign on behalf of the group in an anonymous and unlinkable fashion. In the event of a dispute, a designated trusted entity can reveal the identity of the signer. In this paper we propose a revocation method for group signatures based on the group signature scheme from C. Popescu., (2000). This ...


Secured biometric template

2008 16th IEEE International Conference on Networks, 2008

User authentication and personal privacy is an important aspect of reliable information system. Biometric recognition with cryptography provides a reliable solution for user authentication and identity management. This paper proposes a unique way of creating biometric template using palm-dorsa vein pattern and enhancing its security level by encrypting with elliptic hashing, called biometric encrypted template. The advantage of using elliptic ...


Design of a SIP-based real-time visitor conversation and door control architecture using a home gateway

2006 Digest of Technical Papers International Conference on Consumer Electronics, 2006

Though typical video door phone systems can be used to talk to the visitors at the door, they have some shortcomings: the resident should stay in house and he/she is not informed of any visitor information on his/her return to home. To overcome these limitations, we propose an architecture supporting user mobility, with which the resident at anywhere can view ...


A novel network management architecture based on CORBA and intelligent agent technology

Proceedings. International Conference on Machine Learning and Cybernetics, 2002

Distributed computing technique has increasingly been used in the network management. Furthermore, the agent technology has also been widely used in the performance and fault management of networks. This article put forward an INM (intelligent network management) architecture based on CORBA and intelligent agent technology in the domain of telecommunications network management, using intelligent agent distributed management and grouping managed ...


More Xplore Articles

Educational Resources on Identity management systems

Back to Top

IEEE.tv Videos

David Kravitz: Blockchain-Compatible Identity and Access Management for IoT - Special Session on SIoT: WF-IoT 2016
NIKSUN World Wide Security & Mobility Conference 2011-B Lyons
Q&A: David Kravitz - Special Session on SIoT: WF-IoT 2016
Information Technology: Careers for the information age
26 Years of Risk Management Standardisation - Kevin Knight - Closing Ceremony: Sections Congress 2017
Yahoo's Raghu Ramakrishnan Discusses CAP and Cloud Data Management
IEEE @ SXSW 2015 - Future of Identity Series Overview
A Conversation About Mind/Brain Research and AI Development: IEEE TechEthics Interview
IEEE @ SXSW 2015 - IEEE Future of Identity Official SXSW Party
KeyTalk with Hamish Laird: The Gap Between Large Power Converters and Small Power Converters - APEC 2017
Implantable Wireless Medical Devices and Systems
Group on Earth Observations(GEOSS): Applications
Norha Villegas: The Role of Models at Runtime in Smart Cyber Physical Systems: WF IoT 2016
IMS 2015: Bridging the gap for wearable electronics
Panel: Integrating POC Testing for HLBS Diseases into Clinical Care - IEEE EMBS at NIH, 2019
Grounding for Hybrid Vehicles
Fog Computing Manageability and Orchestration: How To Fuse Cloud, Network, and Fog - Marcelo Yannuzzi, Fog World Congress 2017
Kazunori Iwasa: Challenges in Controlling Data Center Facilities - IoT Challenges Industry Forum Panel: WF IoT 2016
Lillie Coney on the IoT and the Ability to Defend Against the Silent Intruder: 2016 End to End Trust and Security Workshop for the Internet of Things
Trust Management in Edge Clouds with SCONE - IEEE Future Networks Webinar

IEEE-USA E-Books

  • Introduction of the Content ID Forum (cIDf)

    To realize various applications for content distribution via networks, the unique content identifier (Content ID) is indispensable. It can be used for negotiating secondary content use, automatic royalty sharing, content search and exchange, and illegal use detection. In August 1999, responding to a call from Prof. Dr. Hiroshi Yasuda at Univ of Tokyo, the Content ID Forum (cIDf) was established in Japan and began to construct a framework for contents distribution promotion while protecting copyrights. This document overviews the cIDf specifications and its activities.

  • A group signature scheme with revocation

    A group signature scheme allows any group member to sign on behalf of the group in an anonymous and unlinkable fashion. In the event of a dispute, a designated trusted entity can reveal the identity of the signer. In this paper we propose a revocation method for group signatures based on the group signature scheme from C. Popescu., (2000). This method requires no time periods and offers constant length signatures.

  • Secured biometric template

    User authentication and personal privacy is an important aspect of reliable information system. Biometric recognition with cryptography provides a reliable solution for user authentication and identity management. This paper proposes a unique way of creating biometric template using palm-dorsa vein pattern and enhancing its security level by encrypting with elliptic hashing, called biometric encrypted template. The advantage of using elliptic hashing is that, biometric template is easily encrypted and retrieval of original image from the encrypted template is impossible. Crypto analysis suggests that the proposed algorithm provides Confidentiality, authentication, integrity.

  • Design of a SIP-based real-time visitor conversation and door control architecture using a home gateway

    Though typical video door phone systems can be used to talk to the visitors at the door, they have some shortcomings: the resident should stay in house and he/she is not informed of any visitor information on his/her return to home. To overcome these limitations, we propose an architecture supporting user mobility, with which the resident at anywhere can view and converse with a visitor at the front door using PCs, PDA's and home servers with Internet connections. We implemented the proposed architecture using SIP (session initiation protocol) and a home gateway system connected to a conventional intercom or a video door phone system.

  • A novel network management architecture based on CORBA and intelligent agent technology

    Distributed computing technique has increasingly been used in the network management. Furthermore, the agent technology has also been widely used in the performance and fault management of networks. This article put forward an INM (intelligent network management) architecture based on CORBA and intelligent agent technology in the domain of telecommunications network management, using intelligent agent distributed management and grouping managed objects to cache. An INM system has been designed and implemented, and it has provided intelligent network management policies, and thus enhanced the performance of network management with multiple object quick access.

  • The Security Limitations of SSO in OpenID

    As the Internet becomes a way of social life, there are lots of accounts which a user has to manage. To receive the Web service, people have to register each Web site. It is the OpenID to resolve these burdensome. The OpenID provides the single sign-on service which a user can be authenticated in several Web sites by submitting the password of OpenID to authentication server only once. In this paper, we analyze the single sign-on in OpenID and show an experiment of vulnerability of OpenID.

  • Study on Core Capabilities of Tourism Networks

    Tourism business networks are becoming more and more popular in the development of tourism industry. This article analyses the coordination of cooperative activities in tourism business networks by challenging the sustainability of the dasiamanipulatingpsila demand approach in favor of the value system continuum in them. It is hypothesized that local tourism businesses must develop new key capabilities in order to face future global competition. The paper focuses on five key capabilities required to manage tourism business networks. The author put forward that capabilities need in tourism business network managing includes: the coordination of cooperation in tourism business networks, value adding relational value production, building the network brand identity, accumulating necessary knowledge and skills, relative independence and multirole of network node, etc.

  • On structure of corporate and brand identity

    This article discusses the inherent relation between image plans and business management from the point that the structure of corporate and brand identity is an important step to establish the whole image . The aim is to expound and prove that the factor of image construction derives from the composition of corporate organization and product exploitation strategy through analyzing the peculiarities and functions of several kinds of image structures. A reasonable image structure should not only indicate how the corporate is organized but also aim at how to bring about communicational advantage.

  • Semantic SDP

    This paper presents the results of a study on Semantic SDP, bridging semantic web principles with Service Delivery Platform. The objective is to enrich user experience with more significant information and contextual applications, while providing new business opportunities for Service Providers and their ecosystem of application providers.The Semantic Web is a vision for the future of the Web in which information is given explicit meaning, making it easier for machines to automatically process and integrate information available on the Web. When applied to SDP, it leads to Context aware management as a key technology for adaptive service delivery, enabling applications or services to sense the context in which it is currently executed and to react accordingly.

  • Digital Identity Design and Privacy Preservation for e-Learning

    This paper tries to address the security issue which e-learning systems are facing. Through well designed meta-formats of digital identities, the privacy of e-learning users can be well preserved.



Standards related to Identity management systems

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ᆴ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEル MAC Security. c) Facilitates the use of industry ...



Jobs related to Identity management systems

Back to Top