SlideShare une entreprise Scribd logo
1  sur  8
Authentication means in electronic environments
Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication ,[object Object],[object Object],[object Object],[object Object]
Authentication technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges of eID adaption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
STORK project ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
All MS have their own eID infrastructure CITIZEN CITIZEN CITIZEN CITIZEN CITIZEN
Pan European Proxy Service

Contenu connexe

Tendances

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolHasiniG
 
Guide for understanding digital signature
Guide for understanding digital signatureGuide for understanding digital signature
Guide for understanding digital signaturedeannachandler02
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTRajanGoyal16
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Pki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinPki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinNicholas Davis
 
Call for Paper - 11th International Conference on Artificial Intelligence, So...
Call for Paper - 11th International Conference on Artificial Intelligence, So...Call for Paper - 11th International Conference on Artificial Intelligence, So...
Call for Paper - 11th International Conference on Artificial Intelligence, So...mlaij
 
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
 Securing eHealth, eGovernment and eBanking with Java - JCON Conference Securing eHealth, eGovernment and eBanking with Java - JCON Conference
Securing eHealth, eGovernment and eBanking with Java - JCON ConferenceThodoris Bais
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics PosterFaisal Razzak
 
11th International Conference on Artificial Intelligence, Soft Computing and ...
11th International Conference on Artificial Intelligence, Soft Computing and ...11th International Conference on Artificial Intelligence, Soft Computing and ...
11th International Conference on Artificial Intelligence, Soft Computing and ...aciijournal
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...ijsc
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
Digital Identity & Security
Digital Identity & SecurityDigital Identity & Security
Digital Identity & SecurityMichael Bromby
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_Ende77
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
 
Digital signature
Digital signatureDigital signature
Digital signatureJanani S
 

Tendances (19)

Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
 
Guide for understanding digital signature
Guide for understanding digital signatureGuide for understanding digital signature
Guide for understanding digital signature
 
DIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPTDIGITAL SIGNATURE PPT
DIGITAL SIGNATURE PPT
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
Pki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinPki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University Wisconsin
 
Call for Paper - 11th International Conference on Artificial Intelligence, So...
Call for Paper - 11th International Conference on Artificial Intelligence, So...Call for Paper - 11th International Conference on Artificial Intelligence, So...
Call for Paper - 11th International Conference on Artificial Intelligence, So...
 
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
 Securing eHealth, eGovernment and eBanking with Java - JCON Conference Securing eHealth, eGovernment and eBanking with Java - JCON Conference
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
 
Web of Domotics Poster
Web of Domotics PosterWeb of Domotics Poster
Web of Domotics Poster
 
11th International Conference on Artificial Intelligence, Soft Computing and ...
11th International Conference on Artificial Intelligence, Soft Computing and ...11th International Conference on Artificial Intelligence, Soft Computing and ...
11th International Conference on Artificial Intelligence, Soft Computing and ...
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
TMA Blockchain
TMA   BlockchainTMA   Blockchain
TMA Blockchain
 
Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Digital Identity & Security
Digital Identity & SecurityDigital Identity & Security
Digital Identity & Security
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_En
 
Workshop eID
Workshop eIDWorkshop eID
Workshop eID
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
KOM Research Areas
KOM Research AreasKOM Research Areas
KOM Research Areas
 
Digital signature
Digital signatureDigital signature
Digital signature
 

En vedette

Week 30 Sponges
Week 30 SpongesWeek 30 Sponges
Week 30 SpongesCorey Topf
 
Innovation Academy October 28th, 2014 final
Innovation Academy October 28th, 2014 finalInnovation Academy October 28th, 2014 final
Innovation Academy October 28th, 2014 finalCorey Topf
 
Zappos - General Mills - 8-5-09
Zappos - General Mills - 8-5-09Zappos - General Mills - 8-5-09
Zappos - General Mills - 8-5-09zappos
 
Zappos-SIMA-05-15-08
Zappos-SIMA-05-15-08Zappos-SIMA-05-15-08
Zappos-SIMA-05-15-08zappos
 
0809 Iad2 Q1 Hoorcollege1
0809 Iad2 Q1 Hoorcollege10809 Iad2 Q1 Hoorcollege1
0809 Iad2 Q1 Hoorcollege1Hans Kemp
 
Iad1 0809Q2 Hoorcollege 3 Beroepsproducten
Iad1 0809Q2 Hoorcollege 3   BeroepsproductenIad1 0809Q2 Hoorcollege 3   Beroepsproducten
Iad1 0809Q2 Hoorcollege 3 BeroepsproductenHans Kemp
 
Versie 3 Nv Iad2 0910 Q1 Les 4 Patterns For Mobile
Versie 3 Nv  Iad2 0910 Q1 Les 4 Patterns For MobileVersie 3 Nv  Iad2 0910 Q1 Les 4 Patterns For Mobile
Versie 3 Nv Iad2 0910 Q1 Les 4 Patterns For MobileHans Kemp
 
The organisation of social security coordination
The organisation of social security coordinationThe organisation of social security coordination
The organisation of social security coordinationStevenSegaert
 
1011q1 design for mobile les 4 - usabilitytesting for mobile
1011q1 design for mobile    les 4 - usabilitytesting for mobile1011q1 design for mobile    les 4 - usabilitytesting for mobile
1011q1 design for mobile les 4 - usabilitytesting for mobileHans Kemp
 
1011q1 design for mobile les 3 patterns for mobile
1011q1 design for mobile les 3   patterns for mobile1011q1 design for mobile les 3   patterns for mobile
1011q1 design for mobile les 3 patterns for mobileHans Kemp
 
1st Trimester Sponges
1st Trimester Sponges1st Trimester Sponges
1st Trimester SpongesCorey Topf
 
Uxd 0910 q4 hoorcollege expressie en emotie
Uxd 0910 q4 hoorcollege expressie en emotieUxd 0910 q4 hoorcollege expressie en emotie
Uxd 0910 q4 hoorcollege expressie en emotieHans Kemp
 
Framtidens kommunikationslandskap för kommunikatörer
Framtidens kommunikationslandskap för kommunikatörerFramtidens kommunikationslandskap för kommunikatörer
Framtidens kommunikationslandskap för kommunikatörerJohan Ronnestam
 
Chapin Challenge
Chapin ChallengeChapin Challenge
Chapin ChallengeCorey Topf
 
Tips for using the semi-colon
Tips for using the semi-colonTips for using the semi-colon
Tips for using the semi-colonCorey Topf
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLSOlle E Johansson
 
Promozione dei contenuti web sui motori di ricerca - Eupolis Regione Lombardia
Promozione dei contenuti web sui motori di ricerca - Eupolis Regione LombardiaPromozione dei contenuti web sui motori di ricerca - Eupolis Regione Lombardia
Promozione dei contenuti web sui motori di ricerca - Eupolis Regione LombardiaClaudio Celeghin
 
1011q1 design for mobile les 3 patterns for mobile
1011q1 design for mobile les 3   patterns for mobile1011q1 design for mobile les 3   patterns for mobile
1011q1 design for mobile les 3 patterns for mobileHans Kemp
 
Week 35 Sponge
Week 35 SpongeWeek 35 Sponge
Week 35 SpongeCorey Topf
 

En vedette (20)

Week 30 Sponges
Week 30 SpongesWeek 30 Sponges
Week 30 Sponges
 
Innovation Academy October 28th, 2014 final
Innovation Academy October 28th, 2014 finalInnovation Academy October 28th, 2014 final
Innovation Academy October 28th, 2014 final
 
Zappos - General Mills - 8-5-09
Zappos - General Mills - 8-5-09Zappos - General Mills - 8-5-09
Zappos - General Mills - 8-5-09
 
Zappos-SIMA-05-15-08
Zappos-SIMA-05-15-08Zappos-SIMA-05-15-08
Zappos-SIMA-05-15-08
 
0809 Iad2 Q1 Hoorcollege1
0809 Iad2 Q1 Hoorcollege10809 Iad2 Q1 Hoorcollege1
0809 Iad2 Q1 Hoorcollege1
 
Iad1 0809Q2 Hoorcollege 3 Beroepsproducten
Iad1 0809Q2 Hoorcollege 3   BeroepsproductenIad1 0809Q2 Hoorcollege 3   Beroepsproducten
Iad1 0809Q2 Hoorcollege 3 Beroepsproducten
 
Versie 3 Nv Iad2 0910 Q1 Les 4 Patterns For Mobile
Versie 3 Nv  Iad2 0910 Q1 Les 4 Patterns For MobileVersie 3 Nv  Iad2 0910 Q1 Les 4 Patterns For Mobile
Versie 3 Nv Iad2 0910 Q1 Les 4 Patterns For Mobile
 
The organisation of social security coordination
The organisation of social security coordinationThe organisation of social security coordination
The organisation of social security coordination
 
1011q1 design for mobile les 4 - usabilitytesting for mobile
1011q1 design for mobile    les 4 - usabilitytesting for mobile1011q1 design for mobile    les 4 - usabilitytesting for mobile
1011q1 design for mobile les 4 - usabilitytesting for mobile
 
1011q1 design for mobile les 3 patterns for mobile
1011q1 design for mobile les 3   patterns for mobile1011q1 design for mobile les 3   patterns for mobile
1011q1 design for mobile les 3 patterns for mobile
 
1st Trimester Sponges
1st Trimester Sponges1st Trimester Sponges
1st Trimester Sponges
 
Uxd 0910 q4 hoorcollege expressie en emotie
Uxd 0910 q4 hoorcollege expressie en emotieUxd 0910 q4 hoorcollege expressie en emotie
Uxd 0910 q4 hoorcollege expressie en emotie
 
Framtidens kommunikationslandskap för kommunikatörer
Framtidens kommunikationslandskap för kommunikatörerFramtidens kommunikationslandskap för kommunikatörer
Framtidens kommunikationslandskap för kommunikatörer
 
Chapin Challenge
Chapin ChallengeChapin Challenge
Chapin Challenge
 
Tips for using the semi-colon
Tips for using the semi-colonTips for using the semi-colon
Tips for using the semi-colon
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Promozione dei contenuti web sui motori di ricerca - Eupolis Regione Lombardia
Promozione dei contenuti web sui motori di ricerca - Eupolis Regione LombardiaPromozione dei contenuti web sui motori di ricerca - Eupolis Regione Lombardia
Promozione dei contenuti web sui motori di ricerca - Eupolis Regione Lombardia
 
1011q1 design for mobile les 3 patterns for mobile
1011q1 design for mobile les 3   patterns for mobile1011q1 design for mobile les 3   patterns for mobile
1011q1 design for mobile les 3 patterns for mobile
 
Week 35 Sponge
Week 35 SpongeWeek 35 Sponge
Week 35 Sponge
 
User Created Content deel I
User Created Content deel IUser Created Content deel I
User Created Content deel I
 

Similaire à Authentication means in electronic environments

eCommerce-01.ppt
eCommerce-01.ppteCommerce-01.ppt
eCommerce-01.pptGoDown3
 
E-Commerce 0 (1).ppt
E-Commerce 0 (1).pptE-Commerce 0 (1).ppt
E-Commerce 0 (1).pptSujalraj13
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : IntroductionSemlex Europe
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesmarketingkobil
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online bankingAbhilash Kallayil
 
Computer's project
Computer's projectComputer's project
Computer's projectAbdullah555
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Heather Vargas
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...SafeNet
 
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENTENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENTijcsit
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitAlan Quayle
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Ioannis Krontiris
 
From Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFrom Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFilipe Mello
 

Similaire à Authentication means in electronic environments (20)

BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
 
Overview
OverviewOverview
Overview
 
E-Commerce 0.ppt
E-Commerce 0.pptE-Commerce 0.ppt
E-Commerce 0.ppt
 
eCommerce-01.ppt
eCommerce-01.ppteCommerce-01.ppt
eCommerce-01.ppt
 
E-Commerce 0 (1).ppt
E-Commerce 0 (1).pptE-Commerce 0 (1).ppt
E-Commerce 0 (1).ppt
 
Building E-Commerce.ppt
Building E-Commerce.pptBuilding E-Commerce.ppt
Building E-Commerce.ppt
 
Semlex Group : Introduction
Semlex Group : IntroductionSemlex Group : Introduction
Semlex Group : Introduction
 
Secure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologiesSecure E-Banking with KOBIL technologies
Secure E-Banking with KOBIL technologies
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online banking
 
e-commerce
e-commercee-commerce
e-commerce
 
Int Lecture 4
Int Lecture 4Int Lecture 4
Int Lecture 4
 
Computer's project
Computer's projectComputer's project
Computer's project
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENTENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
 
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENTENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
ENFORCING SET AND SSL PROTOCOLS IN EPAYMENT
 
Enforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-PaymentEnforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-Payment
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
From Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFrom Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESET
 

Plus de StevenSegaert

Legal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeLegal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeStevenSegaert
 
Integration of information systems
Integration of information systemsIntegration of information systems
Integration of information systemsStevenSegaert
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and proceduresStevenSegaert
 
e-services benchmarks
e-services benchmarkse-services benchmarks
e-services benchmarksStevenSegaert
 
Interoperability frameworks
Interoperability frameworksInteroperability frameworks
Interoperability frameworksStevenSegaert
 

Plus de StevenSegaert (7)

Legal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchangeLegal aspects of data gathering and information exchange
Legal aspects of data gathering and information exchange
 
Integration of information systems
Integration of information systemsIntegration of information systems
Integration of information systems
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
e-services benchmarks
e-services benchmarkse-services benchmarks
e-services benchmarks
 
Interoperability frameworks
Interoperability frameworksInteroperability frameworks
Interoperability frameworks
 
eGA General 2008 NL
eGA General 2008 NLeGA General 2008 NL
eGA General 2008 NL
 
Tid+ Conference
Tid+ ConferenceTid+ Conference
Tid+ Conference
 

Authentication means in electronic environments