[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chew et al., 1997 - Google Patents

IAuth: An authentication system for Internet applications

Chew et al., 1997

Document ID
11739136743109030382
Author
Chew S
Ng K
Chee C
Publication year
Publication venue
Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97)

External Links

Snippet

With the advent of the Internet, an era of distributed computing is rapidly taking hold. The potential offered by distributed computing increases opportunities for security breaches. This emphasizes the importance of security practices, such as authentication. We have designed …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Similar Documents

Publication Publication Date Title
Horn et al. Authentication protocols for mobile network environment value-added services
US7630493B2 (en) Multiple factor private portion of an asymmetric key
US8340287B2 (en) Securing multifactor split key asymmetric crypto keys
US8099607B2 (en) Asymmetric crypto-graphy with rolling key security
US7069435B2 (en) System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys
US7017041B2 (en) Secure communications network with user control of authenticated personal information provided to network entities
US7599493B2 (en) Asymmetric key pair having a kiosk mode
US7386720B2 (en) Authentication protocol using a multi-factor asymmetric key pair
US8213608B2 (en) Roaming utilizing an asymmetric key pair
US6940980B2 (en) High security cryptosystem
US20030115452A1 (en) One time password entry to access multiple network sites
US20080313719A1 (en) Methods and Apparatus for Delegated Authentication
US7596697B2 (en) Technique for providing multiple levels of security
KR20090095630A (en) Authentication delegation based on re-verification of cryptographic evidence
JP2006511104A (en) Encryption method and encryption apparatus for secure authentication
CA2463034A1 (en) Method and system for providing client privacy when requesting content from a public server
JP2001186122A (en) Authentication system and authentication method
US7565527B2 (en) Technique for asymmetric crypto-key generation
Gollmann et al. Authentication services in distributed systems
GB2378104A (en) Authentification for computer networks using a hybrid protocol and digital certificate
Persiano et al. A secure and private system for subscription-based remote services
Chatterjee et al. A novel multi-server authentication scheme for e-commerce applications using smart card
Parnerkar et al. Secret key distribution protocol using public key cryptography
Chew et al. IAuth: An authentication system for Internet applications
Berger A Scalable Architecture for Public Key Distribution Acting in Concert with Secure DNS