[go: up one dir, main page]

Wouters et al., 2005 - Google Patents

Threat Modelling for Security Tokens in Web Applications

Wouters et al., 2005

View HTML
Document ID
6111432813166731667
Author
Wouters K
Singelee D
Publication year
Publication venue
IFIP—The International Federation for Information Processing

External Links

Snippet

In the last couple of years, several European countries have started projects which intend to provide their citizens with electronic identity cards, driven by the European Directive on Electronic Signatures. One can expect that within a few years, these smart cards will be used …
Continue reading at www.academia.edu (HTML) (other versions)

Similar Documents

Publication Publication Date Title
US11757641B2 (en) Decentralized data authentication
Herzberg et al. Security and identification indicators for browsers against spoofing and phishing attacks
US9628472B1 (en) Distributed password verification
Herzberg et al. Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites
De Cock et al. Threat modelling for security tokens in web applications
Kangwa Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation.
Gordon et al. Cybersecurity & the Courthouse: safeguarding the judicial process
Herzberg et al. Security and identification indicators for browsers against spoofing and phishing attacks
Wouters et al. Threat Modelling for Security Tokens in Web Applications
Ghazizadeh et al. Secure openID authentication model by using trusted computing
Pilania et al. ENCRYPTO: A Reliable and Efficient Mobile App for Password Management
Devi et al. Applied Cryptography
Sullivan The Shortcut Guide to Extended Validation SSL Certificates
Hassan et al. Cryptography and Secure Communication
Mannan Authentication and securing personal information in an untrusted internet
Pleskonjić et al. “Security of Computer Systems and Networks” Book Preview
Kannamanani Software to provide security for Web Browser Cookies and Passwords using Trusted Computing Technology
Leicher et al. Trusted Ticket Systems
Sawma E-commerce security: A new methodology for deriving effective countermeasures design models
Janiszyn BCERT: Securing Electronic Commerce Using A Biometric Secured Token
Krawiecka Improving web security using trusted hardware
Sagers et al. Personal Computing Security Fundamentals
HK40066642B (en) System, method, and computer-readable medium for decentralized data authentication
Böhme et al. A Brief Introduction to Information Security
Daniel et al. Towards a trust envisioned cyber security