Peter Gutmann's Home Pagehttps://www.cs.auckland.ac.nz/~pgut001/
and 4.x authentication, biometrics, PAM, session security overview, SSL, TLS, TLS-PSK, SGC, SSH, TLS vs.SSH, IPsec, IETF politics, AH, ESP, IPsec key management (Photuris, SKIP, I
how we identify ourselves · Adam Wigginshttps://adamwiggins.com/making-computers-better/identity
management of users; biometrics for physically-accessed devices; email as the uniting identifier; and multi-factor authentication for important transactions dealing with contracts
We identify ourselves to computers hundreds of times a day, but it’s a mess. I want digital identity that is easy to use, private, and secure.
Ross Anderson's Home Pagehttps://www.cl.cam.ac.uk/archive/rja14/
cryptography with biometrics shows that in those applications where you can benefit from biometrics, you often don't need a large central database (as proposed for Britain's ID ca
Find more...