Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise

Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their cred...

Full description

Bibliographic Details
Main Author: Pape, Sebastian
Format: eBook
Language:English
Published: Wiesbaden Springer Fachmedien Wiesbaden 2014, 2014
Edition:1st ed. 2014
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Mathematical and Cryptographic Foundation
  • Human Decipherable Encryption Schemes: Introduction, Scenario, and Related Work - Human Decipherable Encryption Scheme - Encryption Schemes Based on Dice Codings - Conclusion and Future Work
  • Non-Transferable Anonymous Credentials: Introduction, Scenario, and Related Work - Privacy and Data Security - Analysis of Non-Transferable Anonymous Credentials - Conclusion and Future Work
  • Outlook and Appendix