On the Identity Trail's Focus on Cryptography:

Cross-Domain Digital Identity Management
By: Dr. Stephan Brands
Presented to Proceedings of the 3rd Annual PKI R&D Workshop in Gaithersburg, April 2004.

Countering Identity Theft through Digital Uniqueness, Location Cross-Checking, and Funneling
By: Paul Van Oorschot and S. Stubblebine
in Financial Cryptography and Data Security 2005 (FC'05), Feb.28-Mar.3 2005, Commonwealth of Dominica. Proceedings: Springer LNCS (to appear).

Secret-Ballot Receipts: True Voter-Verifiable Elections
By: David Chaum
Presented on May 19, 2004, at the ITL Seminar Series - Secret-Ballot Receipts: True Voter-Verifiable Elections, National Institute of Standards and Technology, Gaithersburg, MD.
Presented on May 26, 2004, at the DIMACS Workshop on Electronic Voting, Rutgers University, NJ.
Presented on October 1, 2004 at the Caltech-MIT/Voting Technology Project Symposium 2004, MIT, Cambridge, MA.

Privacy Enhancing Technologies
By: Mohamed Layouni
Presented at the On the Identity Trail Student Salon, Ottawa, June 11, 2004.

Non-Intrusive Cross-Domain Digital Identity Management
By: Stephan Brands
Proceedings of the 3rd Annual PKI R&D Workshop in Gaithersburg, April 2004.

A primer on user identification
By: Stefan Brands
Panopticon, The 15th Annual Conference on Computers, Freedom & Privacy, Keeping an Eye on the Panopticon: Workshop on Vanishing Anonymity, Seattle, April 12, 2005.

With a Little Help from my Friends (and Colleagues): The Multidisciplinary Requirement for Privacy
ID TRAIL MIX
BY: Carlisle Adams

On Canadian developments in Electronic Health Record Management and the need for cross-disciplinary action
ID TRAIL MIX
By: Stefan Brands

On E-Government Authentication and Privacy
ID TRAIL MIX
By: Stefan Brands