IT systems rely on correct authentication of their users in order to provide confidentiality and integrity of data. When accessing systems remotely, for instance over the Internet, no assumptions can be made regarding the level of security on the computer used. Such computers may be exposed to malware, keyloggers and other threats and must therefore generally be considered as untrusted. To increase security when users connect remotely from untrusted clients various authentication mechanisms can be used. Usability must however be considered when deploying new mechanisms. Protection must also be balanced to the load put on users. This thesis gives a presentation of common authentication mechanisms available and enumerates the main attack vect...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
Abstract—With the extension in computer networks, there has been a drastic change in the disposition...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
IT systems rely on correct authentication of their users in order to provide confidentiality and int...
The number of different identities and credentials used for authentication towards services on the I...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Abstract. A remote user authentication system has become an important part of security, along with c...
Nowadays many systems require end users to authenticate themselves. Authentication is one of the sec...
As more and more critically confidential information is managed electronically by distributed inform...
Authentication is a process of verifying the credibility of a user who is trying to access classifie...
The preservation of physical security for computer systems has long been used as a foundation for co...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
M.Sc.(Computer Science)The aim of this dissertation (referred to as thesis in the rest of the docume...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
Abstract—With the extension in computer networks, there has been a drastic change in the disposition...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...
IT systems rely on correct authentication of their users in order to provide confidentiality and int...
The number of different identities and credentials used for authentication towards services on the I...
Mobile devices are becoming more pervasive and more advanced with respect to their processing power ...
Abstract. A remote user authentication system has become an important part of security, along with c...
Nowadays many systems require end users to authenticate themselves. Authentication is one of the sec...
As more and more critically confidential information is managed electronically by distributed inform...
Authentication is a process of verifying the credibility of a user who is trying to access classifie...
The preservation of physical security for computer systems has long been used as a foundation for co...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
M.Sc.(Computer Science)The aim of this dissertation (referred to as thesis in the rest of the docume...
Internet authentication for popular end-user transactions, such as online banking and e-commerce, co...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
Abstract—With the extension in computer networks, there has been a drastic change in the disposition...
Information security has to adapt to an ever-changing environment. Recently there has been a signifi...