Authentication in insecure environments : using visual cryptography and non-transferable credentials in practise /

Saved in:
Bibliographic Details
Author / Creator:Pape, Sebastian, author.
Imprint:Wiesbaden : Springer Vieweg, 2014.
Description:1 online resource (xvi, 362 pages) : illustrations (some color)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11087657
Hidden Bibliographic Details
ISBN:9783658071165
3658071168
365807115X
9783658071158
9783658071158
Notes:"Doctoral thesis at the University of Kassel, Department of Electrical Engineering and Computer Science, defended on September 2nd, 2013, submitted with the title "The challenge of authentication in insecure environments" by Sebastian Pape."
Includes bibliographical references and indexes.
Online resource; title from PDF title page (SpringerLink, viewed September 17, 2014).
Summary:Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards. Contents Human Decipherable Encryption Schemes Visual Cryptography Non-Transferable Anonymous Credentials Authentication Target Groups Teachers, students and practitioners in the fields of cryptography and IT security About the Author Dr. Sebastian Pape is postdoctoral researcher at the Chair of Software Engineering at Technical University Dortmund.
Other form:Printed edition: 9783658071158
Standard no.:10.1007/978-3-658-07116-5

MARC

LEADER 00000cam a2200000Ii 4500
001 11087657
005 20170630045515.1
006 m o d
007 cr cnu---unuuu
008 140917s2014 gw a ob 001 0 eng d
003 ICU
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d E7B  |d N$T  |d YDXCP  |d COO  |d UPM  |d CDX  |d OCLCF  |d IDEBK  |d EBLCP  |d OCLCO  |d OCLCQ  |d OCLCO  |d DEBBG  |d CUY  |d Z5A 
019 |a 908083716 
020 |a 9783658071165  |q (electronic bk.) 
020 |a 3658071168  |q (electronic bk.) 
020 |a 365807115X  |q (print) 
020 |a 9783658071158  |q (print) 
020 |z 9783658071158 
024 7 |a 10.1007/978-3-658-07116-5  |2 doi 
035 |a (OCoLC)890694285  |z (OCoLC)908083716 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 083000  |2 bisacsh 
049 |a MAIN 
100 1 |a Pape, Sebastian,  |e author.  |1 http://viaf.org/viaf/307313257 
245 1 0 |a Authentication in insecure environments :  |b using visual cryptography and non-transferable credentials in practise /  |c Sebastian Pape. 
264 1 |a Wiesbaden :  |b Springer Vieweg,  |c 2014. 
300 |a 1 online resource (xvi, 362 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
500 |a "Doctoral thesis at the University of Kassel, Department of Electrical Engineering and Computer Science, defended on September 2nd, 2013, submitted with the title "The challenge of authentication in insecure environments" by Sebastian Pape." 
504 |a Includes bibliographical references and indexes. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed September 17, 2014). 
505 0 |a Mathematical and Cryptographic Foundation -- Human Decipherable Encryption Schemes: Introduction, Scenario, and Related Work -- Human Decipherable Encryption Scheme -- Encryption Schemes Based on Dice Codings -- Conclusion and Future Work -- Non-Transferable Anonymous Credentials: Introduction, Scenario, and Related Work -- Privacy and Data Security -- Analysis of Non-Transferable Anonymous Credentials -- Conclusion and Future Work -- Outlook and Appendix. 
520 |a Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards. Contents Human Decipherable Encryption Schemes Visual Cryptography Non-Transferable Anonymous Credentials Authentication Target Groups Teachers, students and practitioners in the fields of cryptography and IT security About the Author Dr. Sebastian Pape is postdoctoral researcher at the Chair of Software Engineering at Technical University Dortmund. 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524 
650 0 |a Computer networks  |x Access control.  |0 http://id.loc.gov/authorities/subjects/sh2007008424 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 1 4 |a Computer Science. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Information Systems and Communication Service. 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
655 4 |a Electronic books. 
776 0 8 |i Printed edition:  |z 9783658071158 
856 4 0 |u http://link.springer.com/10.1007/978-3-658-07116-5  |y SpringerLink 
903 |a HeVa 
929 |a eresource 
999 f f |i 2dca6e66-9971-54e1-9621-64e8dc2e05ee  |s 86dc779c-e171-541b-9aae-dfb07f00c436 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-658-07116-5  |z SpringerLink  |g ebooks  |i 9899908