Book 2014

Authentication in Insecure Environments

Using Visual Cryptography and Non-Transferable Credentials in Practise

Authors:

ISBN: 978-3-658-07115-8 (Print) 978-3-658-07116-5 (Online)

Table of contents (11 chapters)

  1. Front Matter

    Pages I-XVI

  2. No Access

    Chapter

    Pages 1-5

    Introduction

  3. Preliminaries

    1. Front Matter

      Pages 7-7

    2. No Access

      Chapter

      Pages 9-77

      Mathematical and Cryptographic Foundation

  4. Human Decipherable Encryption Schemes

    1. Front Matter

      Pages 79-79

    2. No Access

      Chapter

      Pages 81-86

      Introduction, Scenario, and Related Work

    3. No Access

      Chapter

      Pages 87-134

      Human Decipherable Encryption Scheme

    4. No Access

      Chapter

      Pages 135-195

      Human Decipherable Encryption Schemes Based on Dice Codings

    5. No Access

      Chapter

      Pages 197-205

      Conclusion and Future Work

  5. Non-Transferable Anonymous Credentials

    1. Front Matter

      Pages 207-207

    2. No Access

      Chapter

      Pages 209-212

      Introduction, Scenario, and Related Work

    3. No Access

      Chapter

      Pages 213-227

      Privacy and Data Security

    4. No Access

      Chapter

      Pages 229-252

      Analysis of Non-Transferable Anonymous Credentials

    5. No Access

      Chapter

      Pages 253-256

      Conclusion and Future Work

  6. Outlook and Appendix

    1. Front Matter

      Pages 257-257

    2. No Access

      Chapter

      Pages 259-263

      Summary, Conclusion and Outlook

  7. Back Matter

    Pages 265-362