Raising User Acceptance of Token based Authentication by Single Sign-On

Page 9

International Journal of Information and Computer Science

IJICS

international conference on cryptographic hardware and embedded systems (CHES), pp. 30–46, Lecture Notes in Computer Science, LNCS 3659. Springer, (2005). [13] RSA Laboratories. PKCS #11: Cryptographic Token Interface Standard. http://www.rsa.com/rsalabs/node.asp?id=2133, 2004. [Online]. Available: http://www.rsa.com/rsalabs/node.asp?id=2133 [14] S. Wefel and P. Molitor. Client hardware-token based single sign-on over several servers without trusted online third party

server. In: Proceedings of the 3rd international conference on security and assurance (ISA), Advances in information security and its spplication, pp. 29–36, Springer, ser. Communications in computer and information science (CCIS), vol. 36, (2009) June 25–27, Seoul, Korea. [15] D. J. Barrett, R. E. Silverman, and R. G. Byrnes. SSH, The Secure Shell: The Definitive Guide (2nd ed). O’Reilly Media, (2005).

IJICS Volume 1, Issue 3, June 2012 PP. 64-72 www.iji-cs.org © Science and Engineering Publishing Company

- 72 -


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.