Securing Credentials on Untrusted Clients

IT systems rely on correct authentication of their users in order to provide confidentiality and integrity of data. When accessing systems remotely, for instance over the Internet, no assumptions can be made regarding the level of security on the computer used. Such computers may be exposed to malwa...

Full description

Bibliographic Details
Main Author: Hassmund, Johannes
Format: Others
Language:English
Published: Linköpings universitet, Institutionen för datavetenskap 2010
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-54560