BT Technology Journal

, Volume 23, Issue 4, pp 65–70

Fighting entity authentication frauds by combining different technologies

  • Y G Desmedt

DOI: 10.1007/s10550-006-0008-y

Cite this article as:
Desmedt, Y.G. BT Technol J (2005) 23: 65. doi:10.1007/s10550-006-0008-y


Securing entity authentication is less trivial than it seems. In this paper we survey the security issues involved, and analyse whether the technologies available can protect us against fraud. The frauds and abuses could originate from individuals, criminal conspiracies and even governments. We conclude that no single technology is foolproof; a combination of technologies is required.

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  • Y G Desmedt

There are no affiliations available

Personalised recommendations