Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Dirk Balfanz"'
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 2 (2006)
The project MUMMY funded by the European Commission develops means to improve the efficiency of mobile business processes through mobile, personalized knowledge management. MUMMY approaches the challenges of modern mobile work processes. To do so, it
Externí odkaz:
https://doaj.org/article/e3d51c21e1e3461495e804e8f8b7db45
This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS bindings spanning multiple TLS sessions and connections. Applications are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::100444732ca904b5ed77179835400349
https://doi.org/10.17487/rfc8471
https://doi.org/10.17487/rfc8471
Autor:
Andrey Popov, Dirk Balfanz
This document specifies a Transport Layer Security (TLS) extension for the negotiation of Token Binding protocol version and key parameters.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d4b364b5387095cfd58e5d01c4846a50
https://doi.org/10.17487/rfc8472
https://doi.org/10.17487/rfc8472
This document describes a collection of mechanisms that allow HTTP servers to cryptographically bind security tokens (such as cookies and OAuth tokens) to TLS connections. We describe both first-party and federated scenarios. In a first- party scenar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4f6818f179c65739536a6bcd728c71ec
https://doi.org/10.17487/rfc8473
https://doi.org/10.17487/rfc8473
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662549698
Financial Cryptography
Financial Cryptography
“Security Keys” are second-factor devices that protect users against phishing and man-in-the-middle attacks. Users carry a single device and can self-register it with any online service that supports the protocol. The devices are simple to implem
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1a6cbac5892a4239c6499129a9b05b36
https://doi.org/10.1007/978-3-662-54970-4_25
https://doi.org/10.1007/978-3-662-54970-4_25
Autor:
Markus Jakobsson, Jesus Molina, Ori Eisen, Scott Matsumoto, Richard Chow, Steve Kirsch, Dirk Balfanz, Paul C. van Oorschot
Publikováno v:
IEEE Security & Privacy Magazine. 10:22-27
As part of this special issue on authentication, guest editors Richard Chow, Markus Jakobsson, and Jesus Molina put together a roundtable discussion with leaders in the field, who discuss here their views on the biggest problems in authentication, po
Publikováno v:
IEEE Security & Privacy Magazine. 2:19-24
A new system reduces the time to enroll in a secure wireless network by two orders of magnitude, and it also gets high marks for usability and user satisfaction. This article provides a real-world example revealing five general lessons for usable, se
Autor:
Dirk Balfanz, Matthias Finke
Publikováno v:
Computers & Graphics. 28:179-191
Today, people are well-accustomed to broadcasted information as provided by TV, as well as the interactive Web-based retrieval and use of electronic multimedia information. Evolution in technology has also led to the cross-integration of formerly com
Publikováno v:
SOSP
Mobile code technologies such as Java, JavaScript, and ActiveX generally limit all programs to a single restrictive security policy. However, software-based protection can allow for more extensible security models, with potentially significant perfor
Publikováno v:
ACM Conference on Computer and Communications Security
User authentication systems are at an impasse. The most ubiquitous method -- the password -- has numerous problems, including susceptibility to unintentional exposure via phishing and cross-site password reuse. Second-factor authentication schemes ha