Summary
Assess. to which extent current IdM systems and solutions can be enhanced with proxy cryptography schemes
More information & hyperlinks