Cargando…

Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise /

Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their cred...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Pape, Sebastian (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Wiesbaden : Springer Fachmedien Wiesbaden : Imprint: Springer Vieweg, 2014.
Edición:1st ed. 2014.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-658-07116-5
003 DE-He213
005 20220119171033.0
007 cr nn 008mamaa
008 140902s2014 gw | s |||| 0|eng d
020 |a 9783658071165  |9 978-3-658-07116-5 
024 7 |a 10.1007/978-3-658-07116-5  |2 doi 
050 4 |a QA76.9.D35 
050 4 |a Q350-390 
072 7 |a UMB  |2 bicssc 
072 7 |a GPF  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
072 7 |a UMB  |2 thema 
072 7 |a GPF  |2 thema 
082 0 4 |a 005.73  |2 23 
082 0 4 |a 003.54  |2 23 
100 1 |a Pape, Sebastian.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Authentication in Insecure Environments  |h [electronic resource] :  |b Using Visual Cryptography and Non-Transferable Credentials in Practise /  |c by Sebastian Pape. 
250 |a 1st ed. 2014. 
264 1 |a Wiesbaden :  |b Springer Fachmedien Wiesbaden :  |b Imprint: Springer Vieweg,  |c 2014. 
300 |a XVI, 362 p. 46 illus., 6 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Mathematical and Cryptographic Foundation -- Human Decipherable Encryption Schemes: Introduction, Scenario, and Related Work - Human Decipherable Encryption Scheme - Encryption Schemes Based on Dice Codings - Conclusion and Future Work -- Non-Transferable Anonymous Credentials: Introduction, Scenario, and Related Work - Privacy and Data Security - Analysis of Non-Transferable Anonymous Credentials - Conclusion and Future Work -- Outlook and Appendix. 
520 |a Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.  Contents Human Decipherable Encryption Schemes Visual Cryptography Non-Transferable Anonymous Credentials Authentication  Target Groups Teachers, students and practitioners in the fields of cryptography and IT security  About the Author Dr. Sebastian Pape is postdoctoral researcher at the Chair of Software Engineering at Technical University Dortmund. 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Computer networks . 
650 1 4 |a Data Structures and Information Theory. 
650 2 4 |a Computer Communication Networks. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783658071172 
776 0 8 |i Printed edition:  |z 9783658071158 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-658-07116-5  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)