Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the… Mehr…
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards. eBook Sebastian Pape PDF, Vieweg+Teubner Verlag, 02.09.2014, Vieweg+Teubner Verlag, 2014<
Thalia.de
Nr. 40026986. Versandkosten:, Sofort per Download lieferbar, DE. (EUR 0.00) Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the… Mehr…
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards. eBook Sebastian Pape 02.09.2014, Vieweg+Teubner Verlag, Vieweg+Teubner Verlag<
Orellfuessli.ch
Nr. 40026986. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Sofort per Download lieferbar, zzgl. Versandkosten. (EUR 16.77) Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the… Mehr…
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards., Springer Vieweg<
Springer.com
Nr. 978-3-658-07116-5. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00) Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Authentication in Insecure Environments ab 77.99 € als pdf eBook: Using Visual Cryptography and Non-Transferable Credentials in Practise. Aus dem Bereich: eBooks, Sachthemen & Ratgeber, C… Mehr…
Authentication in Insecure Environments ab 77.99 € als pdf eBook: Using Visual Cryptography and Non-Transferable Credentials in Practise. Aus dem Bereich: eBooks, Sachthemen & Ratgeber, Computer & Internet, Medien > Bücher, Authentication in Insecure Environments - eBook als pdf von Sebastian Pape - Vieweg+Teubner Verlag - 9783658071165<
Hugendubel.de
Nr. 22781097. Versandkosten:, , DE. (EUR 0.00) Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the… Mehr…
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards. eBook Sebastian Pape PDF, Vieweg+Teubner Verlag, 02.09.2014, Vieweg+Teubner Verlag, 2014<
Nr. 40026986. Versandkosten:, Sofort per Download lieferbar, DE. (EUR 0.00)
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the… Mehr…
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards. eBook Sebastian Pape 02.09.2014, Vieweg+Teubner Verlag, Vieweg+Teubner Verlag<
Nr. 40026986. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Sofort per Download lieferbar, zzgl. Versandkosten. (EUR 16.77)
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the… Mehr…
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards., Springer Vieweg<
Nr. 978-3-658-07116-5. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00)
Authentication in Insecure Environments ab 77.99 € als pdf eBook: Using Visual Cryptography and Non-Transferable Credentials in Practise. Aus dem Bereich: eBooks, Sachthemen & Ratgeber, C… Mehr…
Authentication in Insecure Environments ab 77.99 € als pdf eBook: Using Visual Cryptography and Non-Transferable Credentials in Practise. Aus dem Bereich: eBooks, Sachthemen & Ratgeber, Computer & Internet, Medien > Bücher, Authentication in Insecure Environments - eBook als pdf von Sebastian Pape - Vieweg+Teubner Verlag - 9783658071165<
1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.
Buch in der Datenbank seit 2014-11-06T07:50:00+01:00 (Berlin) Detailseite zuletzt geändert am 2024-01-17T14:38:02+01:00 (Berlin) ISBN/EAN: 9783658071165
ISBN - alternative Schreibweisen: 3-658-07116-8, 978-3-658-07116-5 Alternative Schreibweisen und verwandte Suchbegriffe: Autor des Buches: pape Titel des Buches: environments, cello
Daten vom Verlag:
Autor/in: Sebastian Pape Titel: Authentication in Insecure Environments - Using Visual Cryptography and Non-Transferable Credentials in Practise Verlag: Springer Vieweg; Springer Fachmedien Wiesbaden GmbH 362 Seiten Erscheinungsjahr: 2014-09-02 Wiesbaden; DE Gedruckt / Hergestellt in Niederlande. Sprache: Englisch 53,49 € (DE) 55,00 € (AT) 59,00 CHF (CH) Available XVI, 362 p. 46 illus., 6 illus. in color.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Algorithmen und Datenstrukturen; Verstehen; Authentication; Computer Safety; Cryptography; Internet Use; Privacy Enhancing Technologies; C; Data Structures and Information Theory; Information Systems and Communication Service; Data Structures and Information Theory; Computer Communication Networks; Computer Science; Informationstheorie; Netzwerk-Hardware; BC
Mathematical and Cryptographic Foundation.- Human Decipherable Encryption Schemes: Introduction, Scenario, and Related Work - Human Decipherable Encryption Scheme - Encryption Schemes Based on Dice Codings - Conclusion and Future Work.- Non-Transferable Anonymous Credentials: Introduction, Scenario, and Related Work - Privacy and Data Security - Analysis of Non-Transferable Anonymous Credentials - Conclusion and Future Work.- Outlook and Appendix.
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten: