Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise /
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their cred...
Main Author: | Pape, Sebastian (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | Electronic eBook |
Language: | English |
Published: |
Wiesbaden :
Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg,
2014.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Similar Items
-
Practical Signcryption
Published: (2010) -
Energy Time Series Forecasting Efficient and Accurate Forecasting of Evolving Time Series from the Energy Domain /
by: Dannecker, Lars
Published: (2015) -
Mobile Authentication Problems and Solutions /
by: Jakobsson, Markus
Published: (2013) -
Information Technology: New Generations 13th International Conference on Information Technology /
Published: (2016) -
Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part I /
Published: (2017)