Abstract
The notion of digital identity cannot be fully understood without considering the concept of authentication. The aim of digital identity is simply to formalize the individualization of access to computer networks, conditional by the existence of means of verifying the digital identity of users or objects. We therefore need to be able to authenticate equipment, services and individual users, whether for local or broader networks, wired or wireless systems and client-server or distributed architectures. All aspects relating to private access, i.e. access control to information and resources reserved to certain entities, are dependent on authentication.
| Original language | English |
|---|---|
| Title of host publication | Digital Identity Management |
| Publisher | Elsevier |
| Pages | 95-135 |
| Number of pages | 41 |
| ISBN (Electronic) | 9781785480041 |
| ISBN (Print) | 9780081005910 |
| DOIs | |
| Publication status | Published - 1 Jan 2015 |
| Externally published | Yes |
Keywords
- Biometric authentication systems
- Challenge-response authentication
- Hash functions
- Man in the middle (MITM)
- Network protocols
- One-time passwords (OTPs)
- S/KEY protocol
- Static password authentication
- Symmetric and asymmetric cryptography
- TLS protocol
Fingerprint
Dive into the research topics of 'Authentication Systems'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver