Using Anonymous Credentials for eID Authentication in the Public Cloud.
Bernd ZwattendorferPublished in: WEBIST (2015)
Keyphrases
- trust negotiation
- cloud computing
- trusted platform module
- access control
- identity management
- user authentication
- virtual machine
- biometric authentication
- authentication protocol
- network access
- identity authentication
- image authentication
- distributed systems
- computing platform
- security mechanisms
- data center
- peer to peer