Abstract: Identity Management (IdM) systems have traditionally relied on a centralized model prone to privacy, trust, and security problems, like potential massive data breaches or identity spoofing.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results