Wouters et al., 2005 - Google Patents
Threat Modelling for Security Tokens in Web ApplicationsWouters et al., 2005
View HTML- Document ID
- 6111432813166731667
- Author
- Wouters K
- Singelee D
- Publication year
- Publication venue
- IFIP—The International Federation for Information Processing
External Links
Snippet
In the last couple of years, several European countries have started projects which intend to provide their citizens with electronic identity cards, driven by the European Directive on Electronic Signatures. One can expect that within a few years, these smart cards will be used …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11757641B2 (en) | Decentralized data authentication | |
| Herzberg et al. | Security and identification indicators for browsers against spoofing and phishing attacks | |
| US9628472B1 (en) | Distributed password verification | |
| Herzberg et al. | Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites | |
| De Cock et al. | Threat modelling for security tokens in web applications | |
| Kangwa | Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation. | |
| Gordon et al. | Cybersecurity & the Courthouse: safeguarding the judicial process | |
| Herzberg et al. | Security and identification indicators for browsers against spoofing and phishing attacks | |
| Wouters et al. | Threat Modelling for Security Tokens in Web Applications | |
| Ghazizadeh et al. | Secure openID authentication model by using trusted computing | |
| Pilania et al. | ENCRYPTO: A Reliable and Efficient Mobile App for Password Management | |
| Devi et al. | Applied Cryptography | |
| Sullivan | The Shortcut Guide to Extended Validation SSL Certificates | |
| Hassan et al. | Cryptography and Secure Communication | |
| Mannan | Authentication and securing personal information in an untrusted internet | |
| Pleskonjić et al. | “Security of Computer Systems and Networks” Book Preview | |
| Kannamanani | Software to provide security for Web Browser Cookies and Passwords using Trusted Computing Technology | |
| Leicher et al. | Trusted Ticket Systems | |
| Sawma | E-commerce security: A new methodology for deriving effective countermeasures design models | |
| Janiszyn | BCERT: Securing Electronic Commerce Using A Biometric Secured Token | |
| Krawiecka | Improving web security using trusted hardware | |
| Sagers et al. | Personal Computing Security Fundamentals | |
| HK40066642B (en) | System, method, and computer-readable medium for decentralized data authentication | |
| Böhme et al. | A Brief Introduction to Information Security | |
| Daniel et al. | Towards a trust envisioned cyber security |