How many FIDO protocols are needed? Analysing the technology, security and compliance

A Angelogianni, I Politis, C Xenakis - ACM Computing Surveys, 2024 - dl.acm.org
To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap
between user friendly interfaces and advanced security features, the Fast IDentity Online …

[PDF][PDF] Why Aren't We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication

L Lassak, E Pan, B Ur, M Golla - 2024 - usenix.org
When adopted by the W3C in 2019, the FIDO2 standard for passwordless authentication
was touted as a replacement for passwords on the web. With FIDO2, users leverage …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arXiv preprint arXiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

A framework for analyzing authentication risks in account networks

D Pöhn, N Gruschka, L Ziegler, A Büttner - Computers & Security, 2023 - Elsevier
Our everyday life depends more and more on online services and, therefore, access to
related user accounts. The security of user accounts, again, is tied to the security of the …

Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics

T Oduguwa, A Arabo - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
User-generated passwords often pose a security risk in authentication systems. However,
providing a comparative substitute poses a challenge, given the common tradeoff between …

TUSH-Key: Transferable User Secrets on Hardware Key

A Mitra, A Ghosh, SC Sethuraman - arXiv preprint arXiv:2307.07484, 2023 - arxiv.org
Passwordless authentication was first tested for seamless and secure merchant payments
without the use of passwords or pins. It opened a whole new world of authentications giving …

TUSH-Key: Transferable User Secrets on Hardware Key

SC Sethuraman, A Mitra, A Ghosh… - 2024 IEEE 30th …, 2024 - ieeexplore.ieee.org
Passwordless authentication has revolutionized secure merchant payments, discarding
reliance on passwords and PINs. Utilizing W3C Web Authentication (WebAuthn) and Client …

An Anonymous Authentication Scheme Based on Blind Signatures for the FIDO Protocol

F Dang, X Sun, K Liu, X Ding… - … Scientific and Technical …, 2024 - ieeexplore.ieee.org
The Fast Identity Online (FIDO) authentication protocol, the latest iteration of the FIDO2
standard, aims to provide a more secure and user-friendly online authentication method. In …

Characterizing and Detecting Password Guessing Attacks

MS Bohuk - 2024 - search.proquest.com
Modern authentication systems still mainly rely on passwords for authentication, but little is
known about legitimate and malicious user behavior during the authentication process due …

QRAuth: A Secure and Accessible Web Authentication Alternative to FIDO2

K Bicakci, A Drobi - 2023 16th International Conference on …, 2023 - ieeexplore.ieee.org
A recently popular alternative being proposed to password-based web authentication is
FIDO2 standard. Although phishing-resistant password-less authentication with FIDO2 is a …