This thesis describes the implementation of a verifier, revocation authority and issuer side of an attribute authentication algorithm, using device with limited performance capabilities. Chosen scheme, RKVAC, functions as an attribute authentication protocol. Which are a protocols designed to protect private user data. RKVAC Scheme complies with Privacy by Design and Privacy by Default principles, which are a part of regulations such as GDPR (General Data Protection Regulation) and eIDAS (Electronic Identification and Trust Services)
This thesis deals with authentication methods, especially about authentication based on knowledge. I...
An extensive analysis of attribute-based encryption (ABE) in systems with resource constrained devic...
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...
The main goal of this diploma thesis was to create web applications for issuer, verifier and revocat...
Authentication has become a critical step to gain access to services such as on-line banking, e-comm...
The bachelor thesis is focused on cryptographic schemes using Attribute-Based Credentials, which try...
Part 1: Invited PapersInternational audienceThis article provides a short overview of the concepts a...
Communication technologies have revolutionized modern society. They have changed the way we do busin...
This thesis explores attribute based credential schemes and the cryptographic preliminaries that are...
This master’s thesis focuses on implementation of ABC (Anonymous attribute-based credential) pilot s...
In this paper we discuss about authentication services using mobile devices, QR codes and attributeb...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Sharing of information is fundamental to modern computing environments across many application domai...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Identification schemes are a common one-way authentication technique for a user to prove himself sec...
This thesis deals with authentication methods, especially about authentication based on knowledge. I...
An extensive analysis of attribute-based encryption (ABE) in systems with resource constrained devic...
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...
The main goal of this diploma thesis was to create web applications for issuer, verifier and revocat...
Authentication has become a critical step to gain access to services such as on-line banking, e-comm...
The bachelor thesis is focused on cryptographic schemes using Attribute-Based Credentials, which try...
Part 1: Invited PapersInternational audienceThis article provides a short overview of the concepts a...
Communication technologies have revolutionized modern society. They have changed the way we do busin...
This thesis explores attribute based credential schemes and the cryptographic preliminaries that are...
This master’s thesis focuses on implementation of ABC (Anonymous attribute-based credential) pilot s...
In this paper we discuss about authentication services using mobile devices, QR codes and attributeb...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Sharing of information is fundamental to modern computing environments across many application domai...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Identification schemes are a common one-way authentication technique for a user to prove himself sec...
This thesis deals with authentication methods, especially about authentication based on knowledge. I...
An extensive analysis of attribute-based encryption (ABE) in systems with resource constrained devic...
Abstract This dissertation investigates authentication techniques in some emerging areas. Specifical...