Searched for: author%3A%22Siljee%2C+B.I.J.%22
(1 - 8 of 8)
document
Siljee, B.I.J. (author)
This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid software developers with the realization of privacy by...
conference paper 2015
document
Everts, M.H. (author), Hoepman, J.H. (author), Siljee, B.I.J. (author)
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunately, passwords are insecure. In this paper we therefore propose the use of strong cryptography, using the fact that users increasingly own a smartphone that can perform the required cryptographic operations on their behalf. This is not as trivial...
conference paper 2013
document
Alpár, G. (author), Hoepman, J.H. (author), Siljee, B.I.J. (author)
This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single, comprehensive study and proposes recommendations...
article 2011
document
Huitema, G.B. (author), Kühne, R. (author), Meyer, U. (author), Ensing, H. (author), Zugenmaier, A. (author), Bibas, A. (author), Karasti, O. (author), Rumph, F.J. (author), Siljee, B.I.J. (author), TNO Informatie- en Communicatietechnologie (author)
As of today, contractual agreements govern the terms of interaction between users and providers as well as between interoperating providers. Such contracts indicate usable services and resources, tariffs, payment methods, etc. Typically, these terms are negotiated once before the contract is signed and are seldom changed thereafter, such that...
article 2010
document
TNO Informatie- en communicatietechnologie (author), van der Waaij, B.D. (author), Siljee, B.I.J. (author), Broekhuijsen, B.J. (author), Ponsioen, C. (author), Maas, A. (author), Aten, R.M. (author), Hoepman, J.H. (author), van Loon, J.H. (author), Smit, M. (author)
A method of making a payment uses a first mobile communication device (1) and a second mobile communication device (2), each mobile communication device being provided with a respective near field communication unit (11, 21) and at least one of the mobile communication devices being provided with an input unit (12) for inputting data. The method...
patent 2009
document
TNO Informatie- en Communicatietechnologie (author), van der Waaij, B.D. (author), Siljee, B.I.J. (author), Broekhuijsen, B.J. (author), Ponsioen, C. (author), Maas, A. (author), Aten, R.M. (author), Hoepman, J.H. (author), van Loon, J.H. (author), Smit, M. (author)
A method of making a payment uses a mobile communication device (1) and a payment card (2), both the mobile communication device (1) and the payment card (2) being provided with a respective near field communication unit (11, 21) and at least the mobile communication device (1) being provided with an input unit (12) for inputting data. The...
patent 2009
document
TNO Informatie- en communicatietechnologie (author), van der Waaij, B.D. (author), Siljee, B.I.J. (author), Broekhuijsen, B.J. (author), Ponsioen, C. (author), Maas, A. (author), Aten, R.M. (author), Hoepman, J.H. (author), van Loon, J.H. (author), Smit, M. (author)
A method of making a payment uses a mobile communication device (1) and a payment card (2), both the mobile communication device (1) and the payment card (2) being provided with a respective near field communication unit (11, 21) and at least the mobile communication device (1) being provided with an input unit (12) for inputting data. The...
patent 2009
document
TNO Informatie- en Communicatietechnologie (author), Hoepman, J.H. (author), Siljee, B.I.J. (author)
For applications like mobile payments for which the use of NFC technology is considered, security is of paramount importance. This whitepaper discusses the main risks associated with using NFC technology, and the possible countermeasures that can be used to mitigate those risks.
report 2007
Searched for: author%3A%22Siljee%2C+B.I.J.%22
(1 - 8 of 8)