Can We Fix the Security Economics of Federated Authentication?
Ross J. AndersonPublished in: Security Protocols Workshop (2011)
Keyphrases
- security mechanisms
- security requirements
- identity authentication
- authentication mechanism
- user authentication
- security analysis
- authentication protocol
- trust relationships
- fuzzy vault
- data encryption
- encryption decryption
- authentication systems
- integrity verification
- authentication scheme
- information security
- high security
- factor authentication
- access control
- biometric data
- identity management
- network security
- virtual private network
- identity based cryptography
- electronic payment
- security services
- biometric recognition
- security level
- security issues
- computational intelligence
- security policies
- key distribution
- security systems
- digital libraries
- smart card
- security protocols
- key agreement
- public key cryptography
- statistical databases
- key agreement protocol
- biometric template
- biometric systems
- biometric authentication
- game theory
- elliptic curve cryptography
- resource constrained
- diffie hellman
- rfid tags
- network management
- encryption scheme
- secure communication
- data security
- distributed systems
- security model