Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. However, the cost of deployment and maintenance of these systems is quite high. On the other hand, mobile network operators have a huge base of deployed smart cards that can be reused to provide authentication in other areas significantly reducing costs. This master\u92s thesis presents a study of how the workstation identity management can be made more secure and user-friendly by using a mobile phone in the Windows workstation logon process. Two workstation logon schemes that utilize both the mobile phone and the UICC insi...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Abstract The design of authentication methods raises crucial questions on how to solve conflicts bet...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
Password based logon schemes have many security weaknesses. For secure environments smart card and b...
The Master thesis work will study and propose how workstation identity management can be made more u...
This project studies commonly used authentication methods and technologies and evaluates their suita...
A mobile single sign on system Today users have to manage a set of username, passwords for every ser...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
The number of different identities and credentials used for authentication towards services on the I...
E-business has been booming for years; however, transaction security is still the biggest worry in t...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
In today's era of technology, information can revolve the whole world within seconds via Internet. D...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Abstract The design of authentication methods raises crucial questions on how to solve conflicts bet...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
Password based logon schemes have many security weaknesses. For secure environments smart card and b...
The Master thesis work will study and propose how workstation identity management can be made more u...
This project studies commonly used authentication methods and technologies and evaluates their suita...
A mobile single sign on system Today users have to manage a set of username, passwords for every ser...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
The number of different identities and credentials used for authentication towards services on the I...
E-business has been booming for years; however, transaction security is still the biggest worry in t...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
In today's era of technology, information can revolve the whole world within seconds via Internet. D...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
Abstract The design of authentication methods raises crucial questions on how to solve conflicts bet...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...