BT Technology Journal

, Volume 23, Issue 4, pp 65–70

Fighting entity authentication frauds by combining different technologies

  • Authors
  • Y G Desmedt
Article

DOI: 10.1007/s10550-006-0008-y

Cite this article as:
Desmedt, Y.G. BT Technol J (2005) 23: 65. doi:10.1007/s10550-006-0008-y
  • 13 Views

Abstract

Securing entity authentication is less trivial than it seems. In this paper we survey the security issues involved, and analyse whether the technologies available can protect us against fraud. The frauds and abuses could originate from individuals, criminal conspiracies and even governments. We conclude that no single technology is foolproof; a combination of technologies is required.

Copyright information

© Springer Science+Business Media, Inc. 2005