Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bhargav-Spantzel, Abhilasha
add a person with the name Bhargav-Spantzel, Abhilasha
 

Other publications of authors with the same name

Verification of Receipts from M-commerce Transactions on NFC Cellular Phones., , , and . CEC/EEE, page 36-43. IEEE Computer Society, (2008)Platform capability based identity management for scalable and secure cloud service access., and . GLOBECOM Workshops, page 763-768. IEEE, (2012)Trust Negotiation in Identity Management., , and . IEEE Security & Privacy, 5 (2): 55-63 (2007)Password policy simulation and analysis., , and . Digital Identity Management, page 1-10. ACM, (2007)Automatic Compliance of Privacy Policies in Federated Digital Identity Management., , , and . POLICY, page 89-92. IEEE Computer Society, (2008)User centricity: A taxonomy and open issues., , , and . Journal of Computer Security, 15 (5): 493-527 (2007)Privacy Requirements in Identity Management Solutions., , , and . HCI (9), volume 4558 of Lecture Notes in Computer Science, page 694-702. Springer, (2007)Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management., , , and . Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, page 78-98. Springer, (2006)Privacy preserving multi-factor authentication with biometrics., , , , , and . Journal of Computer Security, 15 (5): 529-560 (2007)User centricity: a taxonomy and open issues., , , and . Digital Identity Management, page 1-10. ACM, (2006)