Fighting entity authentication frauds by combining different technologies
- Cite this article as:
- Desmedt, Y.G. BT Technol J (2005) 23: 65. doi:10.1007/s10550-006-0008-y
- 14 Downloads
Securing entity authentication is less trivial than it seems. In this paper we survey the security issues involved, and analyse whether the technologies available can protect us against fraud. The frauds and abuses could originate from individuals, criminal conspiracies and even governments. We conclude that no single technology is foolproof; a combination of technologies is required.