|
Showing 1 - 5 of
5 matches in All Departments
|
Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30–September 2, 2022, Proceedings (1st ed. 2023)
Felix Bieker, Joachim Meyer, Sebastian Pape, Ina Schiering, Andreas Weich
|
R2,020
Discovery Miles 20 200
|
Ships in 12 - 17 working days
|
This book contains selected papers presented at the 17th IFIP WG
9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on
Privacy and Identity Management, held online in August/September
2022. The 9 full papers and 5 workshop and tutorial papers included
in this volume were carefully reviewed and selected from 23
submissions. As in previous years, one of the goals of the IFIP
Summer School was to encourage the publication of thorough research
papers by students and emerging scholars. The papers combine
interdisciplinary approaches to bring together a host of
perspectives, such as technical, legal, regulatory, socio-economic,
social or societal, political, ethical, anthropological,
philosophical, or psychological perspectives.
Sebastian Pape discusses two different scenarios for
authentication. On the one hand, users cannot trust their devices
and nevertheless want to be able to do secure authentication. On
the other hand, users may not want to be tracked while their
service provider does not want them to share their credentials.
Many users may not be able to determine whether their device is
trustworthy, i.e. it might contain malware. One solution is to use
visual cryptography for authentication. The author generalizes this
concept to human decipherable encryption schemes and establishes a
relationship to CAPTCHAS. He proposes a new security model and
presents the first visual encryption scheme which makes use of
noise to complicate the adversary's task. To prevent service
providers from keeping their users under surveillance, anonymous
credentials may be used. However, sometimes it is desirable to
prevent the users from sharing their credentials. The author
compares existing approaches based on non-transferable anonymous
credentials and proposes an approach which combines biometrics and
smartcards.
|
|