Sökning: "secure authentication"

Visar resultat 1 - 5 av 41 avhandlingar innehållade orden secure authentication.

  1. 1. Topics in Authentication Theory

    Författare :Christian Gehrmann; Institutionen för elektro- och informationsteknik; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; polynomial evaluation; anonymous secret sharing; multiround authentication; group authentication; threshold cryptography; MAC; secret sharing; cryptology; Authentication; authentication codes; Systems engineering; computer technology; Data- och systemvetenskap;

    Sammanfattning : Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e. LÄS MER

  2. 2. Contributions to unconditionally secure authentication

    Författare :Thomas Johansson; Institutionen för elektro- och informationsteknik; []

    Sammanfattning : This thesis concerns unconditionally secure authentication, i.e., providing protection against an enemy who is assumed to have unlimited computing power. The field is divided into two areas, conventional authentication and authentication for non-trusting parties. LÄS MER

  3. 3. Secure Mobile Service-Oriented Architecture

    Författare :Feng Zhang; Sead Muftic; Jaap-Henk Hoeman; KTH; []
    Nyckelord :ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Secure; Mobile; Service-Oriented Architecture SOA ; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Sammanfattning : Mobile transactions have been in development for around ten years. More and more initiatives and efforts are invested in this area resulting in dramatic and rapid development and deployment of mobile technologies and applications. LÄS MER

  4. 4. Contributions to Web Authentication for Untrusted Computers

    Författare :Anna Vapen; Nahid Shahmehri; Simone Fischer-Hübner; Linköpings universitet; []
    Nyckelord :NATURAL SCIENCES; NATURVETENSKAP; NATURVETENSKAP; NATURAL SCIENCES; Authentication; security levels; identity management; 2-clickAuth; information security; Computer science; Datalogi;

    Sammanfattning : Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas password-based authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. LÄS MER

  5. 5. Be More and be Merry: Enhancing Data and User Authentication in Collaborative Settings

    Författare :Elena Pagnin; Chalmers University of Technology; []
    Nyckelord :NATURVETENSKAP; TEKNIK OCH TEKNOLOGIER; NATURAL SCIENCES; ENGINEERING AND TECHNOLOGY; Homomorphic Signatures; Server-Aided Verification; Distance-Bounding Authentication Protocols; Verifiable Com- putation; Biometric Authentication.;

    Sammanfattning : Cryptography is the science and art of keeping information secret to un-intended parties. But, how can we determine who is an intended party and who is not? Authentication is the branch of cryptography that aims at confirming the source of data or at proving the identity of a person. This Ph.D. LÄS MER