Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise /
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their cred...
Κύριος συγγραφέας: | |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Wiesbaden :
Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg,
2014.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Mathematical and Cryptographic Foundation
- Human Decipherable Encryption Schemes: Introduction, Scenario, and Related Work - Human Decipherable Encryption Scheme - Encryption Schemes Based on Dice Codings - Conclusion and Future Work
- Non-Transferable Anonymous Credentials: Introduction, Scenario, and Related Work - Privacy and Data Security - Analysis of Non-Transferable Anonymous Credentials - Conclusion and Future Work
- Outlook and Appendix.