Pierson et al., 2015 - Google Patents
Authentication without secretsPierson et al., 2015
View PDF- Document ID
- 9171709666172003408
- Author
- Pierson L
- Robertson P
- Publication year
External Links
Snippet
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity …
- 230000004224 protection 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10601805B2 (en) | Securitization of temporal digital communications with authentication and validation of user and access devices | |
| Guajardo et al. | Physical unclonable functions and public-key crypto for FPGA IP protection | |
| US7711152B1 (en) | System and method for authenticated and privacy preserving biometric identification systems | |
| Boonkrong | Authentication and Access Control | |
| JP3595109B2 (en) | Authentication device, terminal device, authentication method in those devices, and storage medium | |
| Kumar et al. | Development of a new cryptographic construct using palmprint-based fuzzy vault | |
| Karabat et al. | THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system | |
| Tuyls et al. | Secret key generation from classical physics: Physical uncloneable functions | |
| Gebotys | Security in embedded devices | |
| JP2001249901A (en) | Authentication device, method therefor and storage medium | |
| Xi et al. | Bio-cryptography | |
| Adeyinka et al. | Cybersecurity measures for protecting data | |
| Khalid et al. | Cloud server security using bio-cryptography | |
| Kiennert et al. | Authentication systems | |
| Wang et al. | A new fingerprint authentication scheme based on secret-splitting for enhanced cloud security | |
| US20240169350A1 (en) | Securing transactions with a blockchain network | |
| Pierson et al. | Authentication without secrets | |
| Nandalal et al. | Design of programmable hardware security modules for enhancing blockchain based security framework | |
| Mitchell et al. | Security of the Lin-Lai smart card based user authentication scheme | |
| TWI381696B (en) | Authentication based on asymmetric cryptography utilizing rsa with personalized secret | |
| Kevenaar et al. | A reference framework for the privacy assessment of keyless biometric template protection systems | |
| Jung et al. | Cryptanalysis and improvement of efficient password-based user authentication scheme using hash function | |
| Hu et al. | Lattice based ring signature scheme for secure cloud-based EMR sharing | |
| Muhaya | Security analysis and improvement of a mutual authentication scheme under trusted computing | |
| Gupta | UPGRADING THE SECURITY OF ELECTRONIC EXCHANGES BY UTILIZING RSA MARKS |