The benefits and drawbacks of using electronic identities

Information Security Technical Report - Tập 13 - Trang 95-103 - 2008
Geraint Price1
1Information Security Group, Royal Holloway, University of London, Egham, Surrey TW20 0EX, United Kingdon

Tài liệu tham khảo

2008, All three US presidential candidates has passports breached, The Guardian CIFAS, the UK's Fraud Prevention Service. http://www.cifas.org.uk/. Diffie, 1976, New directions in cryptography, IEEE Transactions on Information Theory, 22, 644, 10.1109/TIT.1976.1055638 Drimer, 2008, Thinking inside the box: system-level failures of tamper proofing, IEEE Symposium on Security and Privacy EMVCo (Europay Mastercard Visa). http://www.emvco.com/. 2007, How firms and fraudsters deal in data, BBC News Article Matsumoto, Tsutomu. Importance of open discussion on adversarial analyses for mobile security technologies. ITU-T Workshop on Security, Seoul, 14 May 2002. http://groups.csail.mit.edu/cis/crypto/classes/6.857/papers/gummy-slides.pdf. Rivest, 1978, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21, 120, 10.1145/359340.359342 2007, Village hit by credit card scam, BBC News Article