This paper presents a privacy-friendly and portable mobile authentication solution. It addresses several shortcomings of conventional methods such as passwords and smartcard solutions. It also meets the needs of an increasingly mobile user. Trust in the client computer is minimal and the authentication is entirely delegated to the smartphone, which makes it portable across diverse workstations. Our approach involves authentication using securely stored credentials on the smartphone. The client workstation does not need to be modified, whereas only minor changes to the Web server are required.status: publishe
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
This paper describes ongoing research and development aimed at creating a trustworthy software-based...
This paper presents a privacy-friendly and portable mobile authentication solution. It addresses se...
Abstract. This paper presents a privacy-friendly and portable mobile authentication solution. It add...
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunate...
Smartphones have facilitated tasks in private and work life for its users. In business, employees of...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Abstract—This paper analyses the prospect of having a Portable Personal Identity Provider (PPIdP, in...
This paper analyses the prospect of having a Portable Personal Identity Provider (PPIdP, in short) ...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
This thesis looks at the issue of authentication and privacy in mobile Web services. The work in thi...
Currently, the authentication process for personal information o n e-le a rn in g w eb s ite s a llo...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Authentication is a prerequisite for proper access control to many e-services. Often, it is carried ...
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
This paper describes ongoing research and development aimed at creating a trustworthy software-based...
This paper presents a privacy-friendly and portable mobile authentication solution. It addresses se...
Abstract. This paper presents a privacy-friendly and portable mobile authentication solution. It add...
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunate...
Smartphones have facilitated tasks in private and work life for its users. In business, employees of...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Abstract—This paper analyses the prospect of having a Portable Personal Identity Provider (PPIdP, in...
This paper analyses the prospect of having a Portable Personal Identity Provider (PPIdP, in short) ...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
This thesis looks at the issue of authentication and privacy in mobile Web services. The work in thi...
Currently, the authentication process for personal information o n e-le a rn in g w eb s ite s a llo...
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly l...
Authentication is a prerequisite for proper access control to many e-services. Often, it is carried ...
Abstract: Identity management faces new challenges of protecting resources that are aces from differ...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
This paper describes ongoing research and development aimed at creating a trustworthy software-based...