找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Authentication in Insecure Environments; Using Visual Cryptog Sebastian Pape Book 2014 Springer Fachmedien Wiesbaden 2014 Authentication.Co

[复制链接]
查看: 14847|回复: 49
发表于 2025-3-21 19:58:13 | 显示全部楼层 |阅读模式
期刊全称Authentication in Insecure Environments
期刊简称Using Visual Cryptog
影响因子2023Sebastian Pape
视频video
发行地址Publication in the field of technical sciences.Includes supplementary material:
图书封面Titlebook: Authentication in Insecure Environments; Using Visual Cryptog Sebastian Pape Book 2014 Springer Fachmedien Wiesbaden 2014 Authentication.Co
影响因子Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary‘s task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.
Pindex Book 2014
The information of publication is updating

书目名称Authentication in Insecure Environments影响因子(影响力)




书目名称Authentication in Insecure Environments影响因子(影响力)学科排名




书目名称Authentication in Insecure Environments网络公开度




书目名称Authentication in Insecure Environments网络公开度学科排名




书目名称Authentication in Insecure Environments被引频次




书目名称Authentication in Insecure Environments被引频次学科排名




书目名称Authentication in Insecure Environments年度引用




书目名称Authentication in Insecure Environments年度引用学科排名




书目名称Authentication in Insecure Environments读者反馈




书目名称Authentication in Insecure Environments读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-22 00:07:44 | 显示全部楼层
ication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether the
发表于 2025-3-22 02:16:20 | 显示全部楼层
发表于 2025-3-22 05:36:59 | 显示全部楼层
Gerontologie gestern, heute und morgenFor this work, a vague notion of these terms is sufficient. For a more detailed discussion, we refer the reader to the literature cited above. For a taxonomy of privacy in legal terms we recommend the work of S. [Sol06].
发表于 2025-3-22 09:43:07 | 显示全部楼层
Gerontologie gestern, heute und morgenake it unpleasant for the prover to share the credential by connecting it with other systems. The other approach is of more technical nature and tries to prevent the prover from sharing credentials by embedding biometric access control. Of course, it should be guaranteed that this access control does not break the user’s anonymity.
发表于 2025-3-22 16:13:33 | 显示全部楼层
发表于 2025-3-22 18:59:23 | 显示全部楼层
发表于 2025-3-22 22:06:08 | 显示全部楼层
Privacy and Data SecurityFor this work, a vague notion of these terms is sufficient. For a more detailed discussion, we refer the reader to the literature cited above. For a taxonomy of privacy in legal terms we recommend the work of S. [Sol06].
发表于 2025-3-23 01:21:42 | 显示全部楼层
Analysis of Non-Transferable Anonymous Credentialsake it unpleasant for the prover to share the credential by connecting it with other systems. The other approach is of more technical nature and tries to prevent the prover from sharing credentials by embedding biometric access control. Of course, it should be guaranteed that this access control does not break the user’s anonymity.
发表于 2025-3-23 07:06:14 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-17 07:12
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表