Skip to main navigation Skip to search Skip to main content

Authentication Systems

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

The notion of digital identity cannot be fully understood without considering the concept of authentication. The aim of digital identity is simply to formalize the individualization of access to computer networks, conditional by the existence of means of verifying the digital identity of users or objects. We therefore need to be able to authenticate equipment, services and individual users, whether for local or broader networks, wired or wireless systems and client-server or distributed architectures. All aspects relating to private access, i.e. access control to information and resources reserved to certain entities, are dependent on authentication.

Original languageEnglish
Title of host publicationDigital Identity Management
PublisherElsevier
Pages95-135
Number of pages41
ISBN (Electronic)9781785480041
ISBN (Print)9780081005910
DOIs
Publication statusPublished - 1 Jan 2015
Externally publishedYes

Keywords

  • Biometric authentication systems
  • Challenge-response authentication
  • Hash functions
  • Man in the middle (MITM)
  • Network protocols
  • One-time passwords (OTPs)
  • S/KEY protocol
  • Static password authentication
  • Symmetric and asymmetric cryptography
  • TLS protocol

Fingerprint

Dive into the research topics of 'Authentication Systems'. Together they form a unique fingerprint.

Cite this