wiby  
Settings



Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

and 4.x authentication, biometrics, PAM, session security overview, SSL, TLS, TLS-PSK, SGC, SSH, TLS vs.SSH, IPsec, IETF politics, AH, ESP, IPsec key management (Photuris, SKIP, I

how we identify ourselves · Adam Wiggins

https://adamwiggins.com/making-computers-better/identity

management of users; biometrics for physically-accessed devices; email as the uniting identifier; and multi-factor authentication for important transactions dealing with contracts
We identify ourselves to computers hundreds of times a day, but it’s a mess. I want digital identity that is easy to use, private, and secure.

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

cryptography with biometrics shows that in those applications where you can benefit from biometrics, you often don't need a large central database (as proposed for Britain's ID ca


Find more...