1996
DOI: 10.1016/s0167-4048(96)00014-4
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative authentication and vouching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
1
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
1
1
0
Order By: Relevance
“…A user is considered authenticated only when a predefined number of nodes confirm the user's responses. Such an approach also aligns with the research in [14], which proposes a user authentication method based on vouching. Although that research is based on the premise that one user validates another's claim to a digital identity, the same principle may be applied in an environment where a claim is verified by one or more independent systems.…”
Section: Research To Define a Distributed Authentication Architecturesupporting
confidence: 56%
See 1 more Smart Citation
“…A user is considered authenticated only when a predefined number of nodes confirm the user's responses. Such an approach also aligns with the research in [14], which proposes a user authentication method based on vouching. Although that research is based on the premise that one user validates another's claim to a digital identity, the same principle may be applied in an environment where a claim is verified by one or more independent systems.…”
Section: Research To Define a Distributed Authentication Architecturesupporting
confidence: 56%
“…The final DAS votes are summed up and evaluated by the FAS. If all the votes (or a specific number of votes as suggested in [14]) are positive, the user is authenticated. In order for a DAS to know how to access its drawer, a separate element is introduced to the Manifest, the Address book.…”
Section: Manifest Structure and Initializationmentioning
confidence: 99%