• No results found

Web Authentication using Third-Parties in Untrusted

N/A
N/A
Protected

Academic year: 2021

Share "Web Authentication using Third-Parties in Untrusted "

Copied!
1
0
0

Loading.... (view fulltext now)

Full text

(1)

Web Authentication using Third-Parties in Untrusted

Environments

Linköping Studies in Science and Technology Dissertation No. 1768

Anna Vapen

Anna Vapen Web Authentication using Third-Parties in Untrusted Environments 2016

INSTITUTE OF TECHNOLOGY

Linköping Studies in Science and Technology, Dissertation No. 1768, 2016 Department of Computer and Information Science

Linköping University SE-581 83 Linköping, Sweden

www.liu.se

References

Related documents

By analysing the rationales, goals, design and outcomes of public programmes which aim to support TBVs, and by identifying implications for research and for the practical design

The studies presented in this thesis are part of a body of research in Resilience Engineering (RE) that in the past decade has developed theories, methods and models, and

Eghbali, Contributions to Reconfigurable Filter Banks and Transmultiplexers, Linköping Studies in Science and Technology, Diss., No.. Blad, Low Complexity Techniques for Low

1451, 2012 Department of Computer and Information Science. Linköping University 581

As an illustrative example; if using an industrial robot equipped with force control, and using the ART system for fixtures, this enables technical solutions like

Department of Medical and Health Science Linköping University. SE-581 83

1752, 2016 Department of Science and Technology. Linköping University SE-581 83

Department of Computer and Information Science Linköpings universitet. SE-581 83 Linköping