<--- Back to Details
First PageDocument Content
Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control
Cryptography
Computer security
Computer access control
Identity management
Public-key cryptography
Federated identity
Cryptographic protocols
Digital credential
Authentication
Credential
Multi-factor authentication
Access control

Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

Add to Reading List

Source URL: www.e7n.ch

Download Document from Source Website

File Size: 370,75 KB

Share Document on Facebook

Similar Documents

en19  Original Article Behavioural Biometrics for Multi-Factor Authentication in Biomedicine

en19 Original Article Behavioural Biometrics for Multi-Factor Authentication in Biomedicine

DocID: 1uZbV - View Document

CLAVISTER  Multi Factor Authentication F E AT U R E S 	  ƒƒ strong

CLAVISTER Multi Factor Authentication F E AT U R E S ƒƒ strong

DocID: 1ujev - View Document

Selecting a Cloud Provider Checklist (Please also check our Selecting Practice Management Software checklist) Security Does the cloud provider offer multi-factor authentication? Does the cloud provider have a firewall?

DocID: 1tI2H - View Document

A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1  2

A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2

DocID: 1to57 - View Document

Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright © 2015 Centrify Corporation. All Rights Reserved.

Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright © 2015 Centrify Corporation. All Rights Reserved.

DocID: 1sWCQ - View Document