Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their cred...
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Wiesbaden
Springer Fachmedien Wiesbaden
2014, 2014
|
Edition: | 1st ed. 2014 |
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Mathematical and Cryptographic Foundation
- Human Decipherable Encryption Schemes: Introduction, Scenario, and Related Work - Human Decipherable Encryption Scheme - Encryption Schemes Based on Dice Codings - Conclusion and Future Work
- Non-Transferable Anonymous Credentials: Introduction, Scenario, and Related Work - Privacy and Data Security - Analysis of Non-Transferable Anonymous Credentials - Conclusion and Future Work
- Outlook and Appendix