Smejkal et al., 2008 - Google Patents
Development trends of electronic authenticationSmejkal et al., 2008
View PDF- Document ID
- 4578455422260634568
- Author
- Smejkal V
- Kodl J
- Publication year
- Publication venue
- 2008 42nd Annual IEEE International Carnahan Conference on Security Technology
External Links
Snippet
Electronic authentication and authorization aspects are one of burning issues tightly connected with information system security. This article provides a description of present trends in authentication and authorization methods development not only from the …
- 238000011161 development 0 title abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Burr et al. | Electronic Authentication | |
| Andress | Foundations of information security: a straightforward introduction | |
| Abu-Shanab et al. | Security and Fraud Issues of E-banking | |
| US20010048359A1 (en) | Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium | |
| Sadhya et al. | A critical survey of the security and privacy aspects of the Aadhaar framework | |
| CN106911722B (en) | Intelligent password signature identity authentication bidirectional authentication method and system | |
| Bohm et al. | Electronic commerce: Who carries the risk of fraud | |
| Pakojwar et al. | Security in online banking services-A comparative study | |
| Manjula et al. | Pre-authorization and post-authorization techniques for detecting and preventing the session hijacking | |
| Papaspirou et al. | Security Revisited: Honeytokens meet Google Authenticator | |
| Reno | Multifactor authentication: Its time has come | |
| Burr et al. | Sp 800-63-1. electronic authentication guideline | |
| Smejkal et al. | Development trends of electronic authentication | |
| CN106921501A (en) | A kind of intelligent cipher signature identity differentiates authentication method and system | |
| Chen et al. | A trusted biometric system | |
| Hamilton et al. | A global look at authentication | |
| Algamdi | Security Risk Management in the Electronic Banking Environment: Some Evidence for Banking Systems | |
| Majdalawieh et al. | Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking | |
| US20240062316A1 (en) | Commenting entitlement system within an online social networking platform utilizing real-identification verification and method thereof | |
| You et al. | A study on the two-channel authentication method which provides two-way authentication in the Internet banking environment | |
| Graham et al. | It’s all about authentication | |
| Sandhu et al. | Identification and authentication | |
| Marinakis et al. | Strengthening the security of e-banking transactions: the case of NBG | |
| Chaudhary | A Study of Password Stealing Attacks and their Protection Mechanism | |
| Augoye | Eligibility Verifiability in Untrustworthy Voting Environments |