Web Authentication Using Third-Parties in Untrusted Environments.
Saved in:
Superior document: | Linköping Studies in Science and Technology. Dissertations Series ; v.1768 |
---|---|
: | |
Place / Publishing House: | Linköping : : Linkopings Universitet,, 2016. {copy}2016. |
Year of Publication: | 2016 |
Edition: | 1st ed. |
Language: | English |
Series: | Linköping Studies in Science and Technology. Dissertations Series
|
Online Access: | |
Physical Description: | 1 online resource (90 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
The Huawei and Snowden Questions : : Can Electronic Equipment from Untrusted Vendors Be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
by: Lysne, Olav.
Published: (2018.) -
IoT security : : advances in authentication / / edited by Madhusanka Liyanage [and three others].
Published: (2020.) -
Passwords : : Philology, Security, Authentication / / Brian Lennon.
by: Lennon, Brian,
Published: ([2018]) -
Perfect passwords : selection, protection, authentication / / Mark Burnett ; Dave Kleiman, technical editor.
by: Burnett, Mark.
Published: (2006.) -
Instant Java password and authentication security / / Fernando Mayoral.
by: Mayoral, Fernando.
Published: (2013.)