Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method

A large portion of system breaches are caused by authentication failure, either during the login process or in the post-authentication session; these failures are themselves related to the limitations associated with existing authentication methods. Current authentication methods, whether proxy base...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on computers 2014-04, Vol.63 (4), p.902-916
Hauptverfasser: Yan Sui, Xukai Zou, Du, Eliza Y., Feng Li
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!