• Publications
  • Influence
A Taxonomy of Single Sign-On Systems
TLDR
This paper presents a taxonomy of these approaches and puts some of the SSO schemes, services and products into that context; it also reveals some important differences in the security properties. Expand
  • 200
  • 15
  • PDF
A New RFID Privacy Model
TLDR
We propose a new RFID privacy model that is based on the notion of indistinguishability and that does not suffer from the identified drawbacks. Expand
  • 106
  • 10
  • PDF
Impostor: a single sign-on system for use from untrusted devices
TLDR
This paper presents the design of an SSO system that is based on a trusted proxy, and that is suitable for use from an untrusted network access device. Expand
  • 27
  • 6
  • PDF
Single Sign-On Using Trusted Platforms
TLDR
This paper describes a method by which the end-user’s computing platform itself plays the role of the ASP. Expand
  • 40
  • 5
  • PDF
The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method
TLDR
This document specifies EAP-IKEv2, an EAP method that is based on the Internet Key Exchange protocol, and provides mutual authentication and session key establishment between EAP peer and EAP server. Expand
  • 28
  • 5
  • PDF
Relations Among Privacy Notions
TLDR
This paper presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. Expand
  • 23
  • 4
Relations among privacy notions
TLDR
This article presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants, based on the idea of indistinguishability between two worlds. Expand
  • 22
  • 2
  • PDF
Linking Anonymous Transactions: The Consistent View Attack
TLDR
We study the ‘consistent view’ attack that may be launched by cooperating organisations in order to link the transactions and the pseudonyms of the users of an anonymous credential system. Expand
  • 17
  • 2
  • PDF
Using EMV Cards for Single Sign-On
TLDR
In this paper we present a scheme in which EMV-compliant cards provide user (i.e. cardholder) authentication at disparate network Service Providers (SPs). Expand
  • 10
  • 2
  • PDF
Secure Network Management Within an Open-Source Mobile Agent Framework
TLDR
This paper explains how Aglets, a Java open-source MA framework, not a proprietary system, can be used for security-enhanced network management, complementing the security of the Simple Network Management Protocol (SNMP). Expand
  • 15
  • 1