Sökning: "secure authentication"

Visar resultat 1 - 5 av 43 avhandlingar innehållade orden secure authentication.

  1. 1. Topics in Authentication Theory

    Författare :Christian Gehrmann; Institutionen för elektro- och informationsteknik; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; polynomial evaluation; anonymous secret sharing; multiround authentication; group authentication; threshold cryptography; MAC; secret sharing; cryptology; Authentication; authentication codes; Systems engineering; computer technology; Data- och systemvetenskap;

    Sammanfattning : Authentication theory deals with problems connected with the protection of information sent over insecure channels. This thesis concerns different problems in authentication theory. In particular, we consider unconditionally secure authentication, i.e. LÄS MER

  2. 2. Contributions to unconditionally secure authentication

    Författare :Thomas Johansson; Institutionen för elektro- och informationsteknik; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY;

    Sammanfattning : This thesis concerns unconditionally secure authentication, i.e., providing protection against an enemy who is assumed to have unlimited computing power. The field is divided into two areas, conventional authentication and authentication for non-trusting parties. LÄS MER

  3. 3. Secure Mobile Service-Oriented Architecture

    Författare :Feng Zhang; Sead Muftic; Jaap-Henk Hoeman; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Secure; Mobile; Service-Oriented Architecture SOA ; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Sammanfattning : Mobile transactions have been in development for around ten years. More and more initiatives and efforts are invested in this area resulting in dramatic and rapid development and deployment of mobile technologies and applications. LÄS MER

  4. 4. Contributions to Web Authentication for Untrusted Computers

    Författare :Anna Vapen; Nahid Shahmehri; Simone Fischer-Hübner; Linköpings universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Authentication; security levels; identity management; 2-clickAuth; information security; Computer science; Datalogi;

    Sammanfattning : Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas password-based authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. LÄS MER

  5. 5. Design and Identification of Wireless Transmitters for a Low-power and Secure Internet of Things

    Författare :Wenqing Yan; Christian Rohner; Thiemo Voigt; Ambuj Varshney; Haitham Hassanieh; Uppsala universitet; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Wireless transmitters; Wireless embedded systems; Physical-layer security; Radiometric fingerprinting; Radio frequency fingerprinting; Identification; Authentication; Backscatter communication; Internet of Things; Electrical Engineering with Specialisation in Networked Embedded Systems; Elektroteknik med inriktning mot nätverksbaserade inbyggda system; Computer Science with specialization in Computer Communication; Datavetenskap med inriktning mot datorkommunikation;

    Sammanfattning : Wireless communication is a key enabler for connecting billions of Internet of Things devices. For networked embedded devices operating on limited energy resources, wireless communication dominates the power consumption. LÄS MER