Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion).
Ross J. AndersonPublished in: Security Protocols Workshop (2011)
Keyphrases
- security requirements
- security mechanisms
- identity authentication
- authentication mechanism
- data encryption
- trust relationships
- security analysis
- user authentication
- authentication protocol
- authentication systems
- fuzzy vault
- information security
- encryption decryption
- identity management
- factor authentication
- security issues
- integrity verification
- biometric data
- public key cryptography
- computational intelligence
- digital libraries
- high security
- elliptic curve cryptography
- authentication scheme
- access control
- security services
- game theory
- identity based cryptography
- security systems
- smart card
- virtual private network
- security policies
- public key
- public key infrastructure
- intrusion detection
- key agreement
- image authentication
- electronic payment
- computer security
- data security
- biometric recognition
- biometric authentication
- rights management
- wireless local area network
- mutual authentication
- security properties
- security model
- distributed systems
- data sources