Secure Authentication combined with Anonymity: The end of an oxymoron?
Evangelos D. FrangopoulosLucas M. VenterMariki M. EloffPublished in: ISSA (2005)
Keyphrases
- trusted third party
- authentication mechanism
- security mechanisms
- user authentication
- identity management
- security requirements
- authentication scheme
- security analysis
- data encryption
- password authentication
- key distribution
- payment systems
- authentication protocol
- factor authentication
- security properties
- integrity verification
- security issues
- third party
- secure manner
- mutual authentication
- biometric authentication
- digital signature
- privacy protection
- secure communication
- identity authentication
- private key
- electronic payment
- security services
- data protection
- key exchange protocol
- key management
- smart card
- access control
- public key encryption