This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that allows attackers to link user accounts stored in vulnerable authenticators, a …
M Togan, BC Chifor, I Florea… - 2017 9th International …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) devices are getting increasingly popular, becoming a core element for the next generations of informational architectures: smart city, smart factory, smart home …
J Ahn, IG Lee, M Kim - Wireless personal communications, 2020 - Springer
Abstract In general, Internet of Things (IoT) devices collect status information or operate according to control commands from other devices. If the safety and reliability of externally …
DA Roberts, P Smets, M Collinge… - US Patent 10,909,531, 2021 - Google Patents
(57) ABSTRACT A mobile computing device has at least one processor and at least one memory together providing a first execution envi ronment and a second execution …
P Xu, R Sun, W Wang, T Chen, Y Zheng… - Future Generation …, 2021 - Elsevier
The FIDO2 protocol allows users to perform online authentication by setting a public key and avoids the shortcomings of the traditional password authentication mechanism in terms of …
M Uriarte, J Astorga, E Jacob, M Huarte… - IEEE …, 2017 - ieeexplore.ieee.org
Upcoming smart scenarios enabled by the Internet of Things envision smart objects that expose services that can adapt to user behavior or be managed with the goal of achieving …
Y Zhang, X Wang, Z Zhao, H Li - … of the Eighth ACM Conference on Data …, 2018 - dl.acm.org
FIDO protocols enable online services to leverage native authenticators of end-user computing devices including fingerprint readers for authentication to replace or complement …
This research work constitutes a follow-up research to our previous Systematic Literature Research (SLR), which examined the applications and performance of the zk-SNARK, zk …
Verification and validation (V&V) of systems, and system of systems, in an industrial context has never been as important as today. The recent developments in automated cyber …