[go: up one dir, main page]

Crispo et al., 2000 - Google Patents

WWW security and trusted third party services

Crispo et al., 2000

View PDF
Document ID
12230157768637561516
Author
Crispo B
Landrock P
Matyáš Jr V
Publication year
Publication venue
Future Generation Computer Systems

External Links

Snippet

We provide an overview of major findings from the EC project2 'TrustWeb–Security in the WWW, mutual impact of ETS and WWW'. While not all the technical details can be discussed here, we review some of the most relevant ones, referring readers to documents on the …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

Publication Publication Date Title
Herzberg et al. Trustbar: Protecting (even naive) web users from spoofing and phishing attacks
CA3015695C (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
RU2292589C2 (en) Authentified payment
US7231659B2 (en) Entity authentication in a shared hosting computer network environment
US20040030887A1 (en) System and method for providing secure communications between clients and service providers
CN101546407B (en) Electronic commerce system and management method thereof based on digital certificate
AU2008314461A1 (en) Method of providing assured transactions using secure transaction appliance and watermark verification
JP2010500851A (en) Compliance evaluation report service
Herzberg et al. Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites
Onieva et al. Secure multi-party non-repudiation protocols and applications
Hernandez-Ardieta et al. An optimistic fair exchange protocol based on signature policies
Jøsang et al. PKI seeks a trusting relationship
Shakiba et al. ESIV: an end-to-end secure internet voting system
Jøsang et al. Trust management for e-commerce
Crispo et al. WWW security and trusted third party services
US11973881B2 (en) Method for signing contracts
Herzberg et al. Security and identification indicators for browsers against spoofing and phishing attacks
Raymond Choo Issue report on business adoption of Microsoft Passport
Murthy et al. Technologies for e-commerce: An overview
EP4298581A1 (en) Identity conveyance systems
Rattan et al. E-Commerce Security using PKI approach
Gergely et al. BlockCACert–A Blockchain-Based Novel Concept for Automatic Deployment of X. 509 Digital Certificates
Milovanovic et al. Choosing authentication techniques in e-procurement system in Serbia
Rajendran et al. Digital tokens: A scheme for enabling trust between customers and electronic marketplaces
Kinsella Securing e-business in a wireless environment