This thesis explores how hardware security technologies can be applied to satisfy the diverse set of requirements inherent to identity management systems and technologies. This thesis focuses on the use of existing hardware-based security technologies by software rather than developing new hardware components. All concepts proposed in this thesis are subjected to an in-depth evaluation and are validated by means of a prototype.The first part of this thesis deals with device authentication between resource-constrained nodes and more powerful devices. A security architecture is presented that allows low-cost resource-constrained devices to establish a secure authenticated channel with more powerful devices using symmetric-key cryptography. Th...
The Internet is transforming itself and the daily lives of people at a fascinating pace. It revoluti...
This thesis tackles with security aspects of future home networks, where all devices will be connect...
Abstract Identity management is defined as the set of processes related to identity and access infor...
Digital identities represent who we are when engaging in online activities and transactions. The ra...
This paper presents an overview of a mobile communications device that implements a key management p...
Digital identities represent who we are when engaging in online activities and transactions. The rap...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and auth...
With the advances in Information Technology (IT) there has been an increase in threats to the commun...
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and auth...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
The Internet is transforming itself and the daily lives of people at a fascinating pace. It revoluti...
This thesis tackles with security aspects of future home networks, where all devices will be connect...
Abstract Identity management is defined as the set of processes related to identity and access infor...
Digital identities represent who we are when engaging in online activities and transactions. The ra...
This paper presents an overview of a mobile communications device that implements a key management p...
Digital identities represent who we are when engaging in online activities and transactions. The rap...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and auth...
With the advances in Information Technology (IT) there has been an increase in threats to the commun...
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and auth...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
The Internet is transforming itself and the daily lives of people at a fascinating pace. It revoluti...
This thesis tackles with security aspects of future home networks, where all devices will be connect...
Abstract Identity management is defined as the set of processes related to identity and access infor...