Authentication in Insecure Environments

Authentication in Insecure Environments
Author :
Publisher : Springer
Total Pages : 362
Release :
ISBN-10 : 9783658071165
ISBN-13 : 3658071168
Rating : 4/5 (168 Downloads)

Book Synopsis Authentication in Insecure Environments by : Sebastian Pape

Download or read book Authentication in Insecure Environments written by Sebastian Pape and published by Springer. This book was released on 2014-09-02 with total page 362 pages. Available in PDF, EPUB and Kindle. Book excerpt: Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.


Authentication in Insecure Environments Related Books

Authentication in Insecure Environments
Language: en
Pages: 362
Authors: Sebastian Pape
Categories: Computers
Type: BOOK - Published: 2014-09-02 - Publisher: Springer

DOWNLOAD EBOOK

Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do se
Data Intensive Storage Services for Cloud Environments
Language: en
Pages: 342
Authors: Kyriazis, Dimosthenis
Categories: Computers
Type: BOOK - Published: 2013-04-30 - Publisher: IGI Global

DOWNLOAD EBOOK

With the evolution of digitized data, our society has become dependent on services to extract valuable information and enhance decision making by individuals, b
Web Authentication using Third-Parties in Untrusted Environments
Language: en
Pages: 64
Authors: Anna Vapen
Categories:
Type: BOOK - Published: 2016-08-22 - Publisher: Linköping University Electronic Press

DOWNLOAD EBOOK

With the increasing personalization of the Web, many websites allow users to create their own personal accounts. This has resulted in Web users often having man
Biometric Authentication in Online Learning Environments
Language: en
Pages: 314
Authors: Kumar, A.V. Senthil
Categories: Education
Type: BOOK - Published: 2019-02-15 - Publisher: IGI Global

DOWNLOAD EBOOK

Student assessment in online learning is submitted remotely without any face-to-face interaction, and therefore, student authentication is widely seen as one of
Avoiding Unintended Flows of Personally Identifiable Information : Enterprise Identity Management and Online Social Networks
Language: en
Pages: 220
Authors: Labitzke, Sebastian
Categories:
Type: BOOK - Published: 2013-12-17 - Publisher: KIT Scientific Publishing

DOWNLOAD EBOOK