Asynchronous remote key generation: An analysis of yubico's proposal for W3C webauthn

N Frymann, D Gardham, F Kiefer, E Lundberg… - Proceedings of the …, 2020 - dl.acm.org
WebAuthn, forming part of FIDO2, is a W3C standard for strong authentication, which
employs digital signatures to authenticate web users whilst preserving their privacy. Owned …

How not to handle keys: Timing attacks on FIDO authenticator privacy

M Kepkowski, L Hanzlik, I Wood, MA Kaafar - arXiv preprint arXiv …, 2022 - arxiv.org
This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication
protocol that allows attackers to link user accounts stored in vulnerable authenticators, a …

A smart-phone based privacy-preserving security framework for IoT devices

M Togan, BC Chifor, I Florea… - 2017 9th International …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) devices are getting increasingly popular, becoming a core element
for the next generations of informational architectures: smart city, smart factory, smart home …

Design and implementation of hardware-based remote attestation for a secure internet of things

J Ahn, IG Lee, M Kim - Wireless personal communications, 2020 - Springer
Abstract In general, Internet of Things (IoT) devices collect status information or operate
according to control commands from other devices. If the safety and reliability of externally …

Security for mobile applications

DA Roberts, P Smets, M Collinge… - US Patent 10,909,531, 2021 - Google Patents
(57) ABSTRACT A mobile computing device has at least one processor and at least one
memory together providing a first execution envi ronment and a second execution …

SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment

P Xu, R Sun, W Wang, T Chen, Y Zheng… - Future Generation …, 2021 - Elsevier
The FIDO2 protocol allows users to perform online authentication by setting a public key and
avoids the shortcomings of the traditional password authentication mechanism in terms of …

Expressive policy-based access control for resource-constrained devices

M Uriarte, J Astorga, E Jacob, M Huarte… - IEEE …, 2017 - ieeexplore.ieee.org
Upcoming smart scenarios enabled by the Internet of Things envision smart objects that
expose services that can adapt to user behavior or be managed with the goal of achieving …

Secure display for FIDO transaction confirmation

Y Zhang, X Wang, Z Zhao, H Li - … of the Eighth ACM Conference on Data …, 2018 - dl.acm.org
FIDO protocols enable online services to leverage native authenticators of end-user
computing devices including fingerprint readers for authentication to replace or complement …

Benchmarking the zk-SNARK, zk-STARK, and Bulletproof Non-Interactive Zero-Knowledge Proof Protocols in an Equivalent Practical Application

O Roelink - 2024 - essay.utwente.nl
This research work constitutes a follow-up research to our previous Systematic Literature
Research (SLR), which examined the applications and performance of the zk-SNARK, zk …

[HTML][HTML] Verification and validation of an automated robot inspection cell for automotive body-in-white: a use case for the VALU3S ECSEL project

A Kanak, S Ergun, A Yazıcı, M Ozkan… - Open Research …, 2021 - ncbi.nlm.nih.gov
Verification and validation (V&V) of systems, and system of systems, in an industrial context
has never been as important as today. The recent developments in automated cyber …