A survey on adaptive authentication

P Arias-Cabarcos, C Krupitzer, C Becker - ACM Computing Surveys …, 2019 - dl.acm.org
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …

How many FIDO protocols are needed? Analysing the technology, security and compliance

A Angelogianni, I Politis, C Xenakis - ACM Computing Surveys, 2024 - dl.acm.org
To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap
between user friendly interfaces and advanced security features, the Fast IDentity Online …

Asynchronous remote key generation: An analysis of yubico's proposal for W3C webauthn

N Frymann, D Gardham, F Kiefer, E Lundberg… - Proceedings of the …, 2020 - dl.acm.org
WebAuthn, forming part of FIDO2, is a W3C standard for strong authentication, which
employs digital signatures to authenticate web users whilst preserving their privacy. Owned …

Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols

E Ulqinaku, H Assal, AR Abdou, S Chiasson… - 30th USENIX Security …, 2021 - usenix.org
FIDO's U2F is a web-authentication mechanism designed to mitigate real-time phishing—an
attack that undermines multi-factor authentication by allowing an attacker to relay second …

Asynchronous remote key generation for post-quantum cryptosystems from lattices

N Frymann, D Gardham… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Asynchronous Remote Key Generation (ARKG), introduced by Frymann et al. at CCS 2020,
allows for the generation of unlinkable public keys by third parties, for which corresponding …

A web tool for analyzing FIDO2/WebAuthn Requests and Responses

A Vasileios Grammatopoulos, I Politis… - Proceedings of the 16th …, 2021 - dl.acm.org
Passwords are a problem in today's digital world. FIDO2, through WebAuthn, brought
alternative password-less authentication that is more usable and secure than classic …

Generalised asynchronous remote key generation for pairing-based cryptosystems

N Frymann, D Gardham, M Manulis, H Nartz - International Conference on …, 2023 - Springer
Abstract Asynchronous Remote Key Generation (ARKG, introduced in ACM CCS 2020)
allows for a party to create public keys for which corresponding private keys may be later …

On an innovative architecture for digital immunity passports and vaccination certificates

JC Polley, I Politis, C Xenakis, A Master… - arXiv preprint arXiv …, 2021 - arxiv.org
With the COVID-19 pandemic entering a second phase and vaccination strategies being
applied by countries and governments worldwide, there is an increasing expectation by …

Proven and modern approaches to identity management

D Pöhn, W Hommel - Advances in Cybersecurity Management, 2021 - Springer
People around the world stay in contact with their families, friends, and colleagues by
exchanging text and multimedia data online. This would not be possible without digital …

[图书][B] Transforming Information Security: Optimizing Five Concurrent Data Trends to Reduce Resource Drain

KM Moriarty - 2020 - emerald.com
McKinnon, JD, & MacMillan, D.(2018). Google says it continues to allow apps to ScanData
from gmail accounts. Wall Street Journal. Retrieved from https://www. wsj …