Login / Signup
Authentication and Authorisation Infrastructures in b2c e-Commerce.
Christian Schläger
Günther Pernul
Published in:
EC-Web (2005)
Keyphrases
</>
security analysis
security model
identity authentication
security policies
biometric authentication
data management
image authentication
identity management
authentication mechanism
real time
authentication protocol
security mechanisms
user authentication
authentication scheme
public key cryptography