Password-based credentials with security against server compromise

D Dayanikli, A Lehmann - … Symposium on Research in Computer Security, 2023 - Springer
… of the server’s stored verification data is one of the main threats in user authentication, our
… remain secure even when the server’s key got compromised. We first show that the desired …

oPass: A user authentication protocol resistant to password stealing and password reuse attacks

HM Sun, YH Chen, YH Lin - … information forensics and security, 2011 - ieeexplore.ieee.org
… to server via an SMS message. Based on preshared secret credential , server can verify and
authenticate user … An attacker can compromise a weak server, eg, a server without security

Using a personal device to strengthen password authentication from an untrusted computer

M Mannan, PC Van Oorschot - … Financial Cryptography and Data Security, 2007 - Springer
… , such malware has instant access, compromising (reusable) long-… ID verification (see below)
in cases where protecting the … may easily be extended to protect other identity credentials

Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment

AG Reddy, EJ Yoon, AK Das, V Odelu, KY Yoo - IEEE access, 2017 - ieeexplore.ieee.org
… The formal security of the proposed protocol is verified using … data and the user credentials
are compromised. This is an … of authentication protocol irrespective of the level of security

Strengthening user authentication through opportunistic cryptographic identity assertions

A Czeskis, M Dietz, T Kohno, D Wallach… - … communications security, 2012 - dl.acm.org
compromise the same user’s PC and user’s personal device. … , unphishable credentials (eg,
a cookie or an identity assertion … that service providers verify the user identity via a thorough …

Authentication at scale

E Grosse, M Upadhyay - IEEE Security & Privacy, 2012 - ieeexplore.ieee.org
… submit a bearer-token credential, such as a password, to a … protected from compromise.However,
not nearly enough of our … Now if users go a long time without typing a 2sv validation

[PDF][PDF] Enhancing performance of user authentication protocol with resist to password reuse attacks

RR Karthiga, K Aravindhan - Int. J. Comput. Eng. Res, 2012 - Citeseer
… , user’s passwords are prone to be stolen and compromised … the oPass enhancement to
protect user identity; it requires a … secret credential, server can verify and authenticate user

Man in the cloud (mitc) defender: Sgx-based user credential protection for synchronization applications in cloud computing platform

X Liang, S Shetty, L Zhang… - 2017 IEEE 10th …, 2017 - ieeexplore.ieee.org
… The compromise of user credentials leads to opportunities for adversaries to steal and modify
… We add machine identity to credential verification during bootstrapping process to make …

Trust no one else: Detecting MITM attacks against SSL/TLS without third-parties

I Dacosta, M Ahamad, P Traynor - … on Research in Computer Security, Pisa …, 2012 - Springer
… its formal security proof and its ability to useserver compromise similar to augmented PAKE
protocols. The adversary can still use offline dictionary attacks against the stolen credentials

Leveraging personal devices for stronger password authentication from untrusted computers

M Mannan, PC van Oorschot - Journal of Computer Security, 2011 - content.iospress.com
protect user inputs from a phishing website, or compromised (… may easily be extended to
protect other identity credentials … In this section we discuss a proof sketch of MP-Auth using the …