Crispo et al., 2000 - Google Patents
WWW security and trusted third party servicesCrispo et al., 2000
View PDF- Document ID
- 12230157768637561516
- Author
- Crispo B
- Landrock P
- Matyáš Jr V
- Publication year
- Publication venue
- Future Generation Computer Systems
External Links
Snippet
We provide an overview of major findings from the EC project2 'TrustWeb–Security in the WWW, mutual impact of ETS and WWW'. While not all the technical details can be discussed here, we review some of the most relevant ones, referring readers to documents on the …
- 201000007023 thrombotic thrombocytopenic purpura 0 abstract description 35
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Herzberg et al. | Trustbar: Protecting (even naive) web users from spoofing and phishing attacks | |
| CA3015695C (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
| RU2292589C2 (en) | Authentified payment | |
| US7231659B2 (en) | Entity authentication in a shared hosting computer network environment | |
| US20040030887A1 (en) | System and method for providing secure communications between clients and service providers | |
| CN101546407B (en) | Electronic commerce system and management method thereof based on digital certificate | |
| AU2008314461A1 (en) | Method of providing assured transactions using secure transaction appliance and watermark verification | |
| JP2010500851A (en) | Compliance evaluation report service | |
| Herzberg et al. | Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites | |
| Onieva et al. | Secure multi-party non-repudiation protocols and applications | |
| Hernandez-Ardieta et al. | An optimistic fair exchange protocol based on signature policies | |
| Jøsang et al. | PKI seeks a trusting relationship | |
| Shakiba et al. | ESIV: an end-to-end secure internet voting system | |
| Jøsang et al. | Trust management for e-commerce | |
| Crispo et al. | WWW security and trusted third party services | |
| US11973881B2 (en) | Method for signing contracts | |
| Herzberg et al. | Security and identification indicators for browsers against spoofing and phishing attacks | |
| Raymond Choo | Issue report on business adoption of Microsoft Passport | |
| Murthy et al. | Technologies for e-commerce: An overview | |
| EP4298581A1 (en) | Identity conveyance systems | |
| Rattan et al. | E-Commerce Security using PKI approach | |
| Gergely et al. | BlockCACert–A Blockchain-Based Novel Concept for Automatic Deployment of X. 509 Digital Certificates | |
| Milovanovic et al. | Choosing authentication techniques in e-procurement system in Serbia | |
| Rajendran et al. | Digital tokens: A scheme for enabling trust between customers and electronic marketplaces | |
| Kinsella | Securing e-business in a wireless environment |