[go: up one dir, main page]

Pierson et al., 2015 - Google Patents

Authentication without secrets

Pierson et al., 2015

View PDF
Document ID
9171709666172003408
Author
Pierson L
Robertson P
Publication year

External Links

Snippet

This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity …
Continue reading at www.osti.gov (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
US10601805B2 (en) Securitization of temporal digital communications with authentication and validation of user and access devices
Guajardo et al. Physical unclonable functions and public-key crypto for FPGA IP protection
US7711152B1 (en) System and method for authenticated and privacy preserving biometric identification systems
Boonkrong Authentication and Access Control
JP3595109B2 (en) Authentication device, terminal device, authentication method in those devices, and storage medium
Kumar et al. Development of a new cryptographic construct using palmprint-based fuzzy vault
Karabat et al. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system
Tuyls et al. Secret key generation from classical physics: Physical uncloneable functions
Gebotys Security in embedded devices
JP2001249901A (en) Authentication device, method therefor and storage medium
Xi et al. Bio-cryptography
Adeyinka et al. Cybersecurity measures for protecting data
Khalid et al. Cloud server security using bio-cryptography
Kiennert et al. Authentication systems
Wang et al. A new fingerprint authentication scheme based on secret-splitting for enhanced cloud security
US20240169350A1 (en) Securing transactions with a blockchain network
Pierson et al. Authentication without secrets
Nandalal et al. Design of programmable hardware security modules for enhancing blockchain based security framework
Mitchell et al. Security of the Lin-Lai smart card based user authentication scheme
TWI381696B (en) Authentication based on asymmetric cryptography utilizing rsa with personalized secret
Kevenaar et al. A reference framework for the privacy assessment of keyless biometric template protection systems
Jung et al. Cryptanalysis and improvement of efficient password-based user authentication scheme using hash function
Hu et al. Lattice based ring signature scheme for secure cloud-based EMR sharing
Muhaya Security analysis and improvement of a mutual authentication scheme under trusted computing
Gupta UPGRADING THE SECURITY OF ELECTRONIC EXCHANGES BY UTILIZING RSA MARKS