Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise /
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their cred...
Main Author: | |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Wiesbaden :
Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg,
2014.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Mathematical and Cryptographic Foundation
- Human Decipherable Encryption Schemes: Introduction, Scenario, and Related Work - Human Decipherable Encryption Scheme - Encryption Schemes Based on Dice Codings - Conclusion and Future Work
- Non-Transferable Anonymous Credentials: Introduction, Scenario, and Related Work - Privacy and Data Security - Analysis of Non-Transferable Anonymous Credentials - Conclusion and Future Work
- Outlook and Appendix.