Combining Strong Authentication, Strong Privacy and User Centricity - What are the Potentials of Modern eID Cards?
Facebook Twitter LinkedIn

Combining Strong Authentication, Strong Privacy and User Centricity - What are the Potentials of Modern eID Cards?

Combined Session
Wednesday, May 06, 2009 11:30—12:30
Location: ANTARES

Combining Strong Authentication, Strong Privacy and User Centricity - What are the Potentials of Modern eID Cards?

Markus  Hoffmeister
Markus Hoffmeister
cv cryptovision GmbH
Markus Hoffmeister was 18 when he founded his first company where he sold self-developed accounting software to construction companies and medical practices. While studying mathematics, he and his...
Jürgen König
Jürgen König
Nexus Technology GmbH
Jürgen’s goal is to turn neXus into the number one in identity management for converged access. As founder and CEO of vps ID Systems, Jürgen has comprehensive experience in both the...
Dr. Klaus Lüttich
Dr. Klaus Lüttich
bremen online services (bos) GmbH & Co. KG
Dr. Klaus Lüttich has been working for bos since 2007 in the area of authentication and identity management. Since 1999 bos is a software enterprise that develops and implements e-government...
Olivier Maas
Olivier Maas
Atos Worldline
Olivier Maas is working for Atos Worldline's R&D department as a project manager on digital identity management. He is designing innovative implementation of IM technology applied on secure...
Anthony Nadalin
Anthony Nadalin
Microsoft
Anthony Nadalin is a partner architect in the Government Engagement Team leading the Standards and Public Policy practice. Anthony had spent the last 27 years with IBM where he was the Chief...

How Strong can User Centric Authentication be?

Based on a new report on User Centric (Strong) Authentication, Martin Kuppinger will talk about trends for authenticating users at the Identity Provider and the opportunities we observe there – from simple approaches to strong authentication up to the use of tokens like the new electronic passports. The different options, their strengths and weaknesses are compared. Beyond this, Martin Kuppinger will also discuss which type of authentication is required for which type of interaction and transaction based on user-centric technologies.

 

Stina Ehrensvärd
Stina Ehrensvärd
Yubico
Stina Ehrensvard is the CEO and Founder of Yubico, and co-inventor of the YubiKey – a small device that makes strong two-factor authentication easy and affordable for everyone. She is...
Martin Kuppinger
Martin Kuppinger
KuppingerCole
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
Karin Loleit
Karin Loleit
Nexus Technology
Karin Loleit has more than ten years experience in IT-security and IT-security management. From 2000 until March 2009 she managed complex IT-security projects with BDG GmbH & Co KG, where she...
Jim Reno
Jim Reno
Arcot Systems
Eric Voss
Eric Voss
AXSionics AG
Eric Voss is Vice President of Partner Sales, AXSionics AG, Biel, Switzerland.During his professional lifetime he spent 10 years in the German Airforce being a Technlcal Officer for the Tornado...
Subscribe for updates
Please provide your email address