Login / Signup

Securing payments through effective authentication: Evaluating trusted third party proposals for a trust hierarchy in the UK.

Heather Rowe
Published in: Comput. Law Secur. Rev. (1998)
Keyphrases
  • public key
  • digital signature
  • trusted third party
  • credit card
  • third party
  • trust model
  • identity management
  • data mining
  • digital libraries
  • wireless networks
  • security protocols
  • security services