The government has revealed plans for a national proof-of-identity scheme that privacy campaigners say has echoes of the ID card project that was scrapped less than six months ago. The identity ...
I’m still on my quest to find good user authentication techniques that can supplement or replace the old username and password scheme. In this age of spoofing, phishing and stolen IDs, we need strong ...
Anonymous authentication plays a crucial role in privacy-focused applications, and it is used for authenticating a user’s identity in a privacy-preserving way. If enough privacy is provided, malicious ...
In 2015, Tso et al.’s demonstrated that the researchers password authentication scheme could not achieve the user anonymity property and do not allow changing password freely for the user. Then, they ...
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less ...
Move affects nomadic and semi nomadic communities lacking permanent address as rights groups warn data mismatch risks and ...