£40.68

Springer Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise

Price data last checked 66 day(s) ago - refreshing...

View at Amazon

Price History & Forecast

Last 25 days • 25 data points (No recent data available)

Historical
Generating forecast...
£40.68 £38.65 £39.46 £40.27 £41.09 £41.90 £42.71 25 January 2026 31 January 2026 06 February 2026 12 February 2026 18 February 2026

Price Distribution

Price distribution over 25 days • 1 price levels

Days at Price
25 days 0 6 13 19 25 £41 Days at Price

Price Analysis

Most common price: £41 (25 days, 100.0%)

Price range: £41 - £41

Price levels: 1 different prices over 25 days

Description

Product Description Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards. Review “This book is based on the doctoral dissertation of Sebastian Pape … on the challenge of authentication in insecure environments. … The bibliography is exhaustive and the indexes are adequate. … This interesting and practically oriented book is well written for an audience comprising students, teachers, and practitioners of cryptography and information technology (IT) security. I strongly recommend the book for its intended audience.” (S. V. Nagaraj, Computing Reviews, October, 2015) From the Back Cover Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.  Contents Human Decipherable Encryption Schemes Visual Cryptography Non-Transferable Anonymous Credentials Authentication  Target Groups Teachers, students and practitioners in the fields of cryptography and IT security  About the Author Dr. Sebastian Pape is postdoctoral researcher at the Chair of Software Engineering at Technical University Dortmund. About the Author Dr. Sebastian Pape is postdoctoral researcher at the Chair of Software Engineering at Technical University Dortmund.

Product Specifications

Format
paperback
Domain
Amazon UK
Publication Date
16 September 2014
Listed Since
07 August 2014

Barcode

No barcode data available

Similar Products You Might Like

Authentication and Access Control: Practical Cryptography Methods and Tools
93% match

Authentication and Access Control: Practical Cryptography Methods and Tools

Apress

£42.80 23 Feb 2026
CRC Press Touchless Fingerprint Biometrics Book
93% match

CRC Press Touchless Fingerprint Biometrics Book

CRC Press

£100.84 17 Apr 2026
Transparent User Authentication: Biometrics, RFID and Behavioural Profiling
93% match

Transparent User Authentication: Biometrics, RFID and Behavioural Profiling

Springer

£78.85 25 Feb 2026
Evolution of Smart Sensing Ecosystems with Tamper Evident Security
93% match

Evolution of Smart Sensing Ecosystems with Tamper Evident Security

Springer

£102.09 23 Feb 2026
Attribute-Based Encryption and Access Control: From Theory to Practice (Data-Enabled Engineering)
93% match

Attribute-Based Encryption and Access Control: From Theory to Practice (Data-Enabled Engineering)

CRC Press

£151.80 07 Feb 2026
Contact Tracing in Post-Covid World: A Cryptologic Approach (Indian Statistical Institute Series)
93% match

Contact Tracing in Post-Covid World: A Cryptologic Approach (Indian Statistical Institute Series)

Springer

£85.06 10 Mar 2026
Contact Tracing in Post-Covid World: A Cryptologic Approach (Indian Statistical Institute Series)
93% match

Contact Tracing in Post-Covid World: A Cryptologic Approach (Indian Statistical Institute Series)

Springer

£94.00 23 Feb 2026
Springer Advances in Cyber Security - Principles and Techniques
93% match

Springer Advances in Cyber Security - Principles and Techniques

Springer

£94.25 15 Apr 2026
Predictive Computing and Information Security
93% match

Predictive Computing and Information Security

Springer

£81.41 09 Mar 2026
Reversible Steganography and Authentication via Transform Encoding: 901 (Studies in Computational Intelligence, 901)
93% match

Reversible Steganography and Authentication via Transform Encoding: 901 (Studies in Computational Intelligence, 901)

Springer

£116.65 22 Feb 2026
Handbook of Image-based Security Techniques
93% match

Handbook of Image-based Security Techniques

CRC Press

£101.00 09 Mar 2026
Steganography Techniques for Digital Images
93% match

Steganography Techniques for Digital Images

Springer

£87.47 24 Feb 2026
Information Security in Diverse Computing Environments (Advances in Information Security, Privacy, and Ethics)
93% match

Information Security in Diverse Computing Environments (Advances in Information Security, Privacy, and Ethics)

Information Science Reference

£203.21 30 Jan 2026
Multimodal Biometric and Machine Learning Technologies: Applications for Computer Vision
93% match

Multimodal Biometric and Machine Learning Technologies: Applications for Computer Vision

John Wiley & Sons Inc

£145.77 31 Jan 2026
Functional Encryption (EAI/Springer Innovations in Communication and Computing)
93% match

Functional Encryption (EAI/Springer Innovations in Communication and Computing)

Springer

£77.88 01 Apr 2026
CRC Press Emerging Security Algorithms and Techniques Book
93% match

CRC Press Emerging Security Algorithms and Techniques Book

CRC Press

£82.27 18 Apr 2026
CRC Press - Cybersecurity and Privacy in Cyber Physical Systems
93% match

CRC Press - Cybersecurity and Privacy in Cyber Physical Systems

CRC Press

£94.86 05 Mar 2026
Information Security Practices: Emerging Threats and Perspectives
93% match

Information Security Practices: Emerging Threats and Perspectives

Springer

£87.38 24 Feb 2026
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
93% match

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks

Springer

£92.00 23 Feb 2026
Practical Signcryption (Information Security and Cryptography)
93% match

Practical Signcryption (Information Security and Cryptography)

Springer

£73.75 23 Feb 2026
Advances in Biometrics for Secure Human Authentication and Recognition
93% match

Advances in Biometrics for Secure Human Authentication and Recognition

CRC Press

£120.00 23 Feb 2026
Internet of Things Security: Challenges, Advances, and Analytics
93% match

Internet of Things Security: Challenges, Advances, and Analytics

CRC Press

£60.35 08 Mar 2026
Internet of Things Security: Challenges, Advances, and Analytics
93% match

Internet of Things Security: Challenges, Advances, and Analytics

CRC Press

£120.69 01 Mar 2026
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
93% match

Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment

Springer

£87.47 23 Feb 2026