[PDF][PDF] A Formal Analysis of the FIDO UAF Protocol.

H Feng, H Li, X Pan, Z Zhao, T Cactilab - NDSS, 2021 - ndss-symposium.org
The FIDO protocol suite aims at allowing users to log in to remote services with a local and
trusted authenticator. With FIDO, relying services do not need to store user-chosen secrets …

A novel secure and privacy-preserving model for OpenID connect based on blockchain

B Yousra, S Yassine, M Yassine, S Said, T Lo'ai… - IEEE …, 2023 - ieeexplore.ieee.org
OpenID Connect (OIDC) is one of the most widely used delegated authentication protocols
in web and mobile applications providing a single sign-on experience. It allows third-party …

Smart card-based secure authentication protocol in multi-server IoT environment

W Bae, J Kwak - Multimedia Tools and Applications, 2020 - Springer
In recent years, the internet of things has been widely utilized in various fields, such as in
smart factories or connected cars. As its domain of application has expanded, it has begun …

Challenging channels: Encrypted covert channels within challenge-response authentication

T Schmidbauer, J Keller, S Wendzel - Proceedings of the 17th …, 2022 - dl.acm.org
Challenge-response authentication is an essential and omnipresent network service. Thus,
it is a lucrative target for attackers to transport covert information. We present two covert …

FIDO gets verified: A formal analysis of the universal authentication framework protocol

H Feng, J Guan, H Li, X Pan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The FIDO protocol suite aims at allowing users to log in to remote services with a local and
trusted authenticator. With FIDO, relying services do not need to store user-chosen secrets …

Non-invasive challenge response authentication for voice transactions with smart home behavior

V Hayashi, W Ruggiero - Sensors, 2020 - mdpi.com
Smart speakers, such as Alexa and Google Home, support daily activities in smart home
environments. Even though voice commands enable friction-less interactions, existing …

A new certificateless and secure authentication scheme for ad hoc networks

S Bakhtiari-Chehelcheshmeh… - Wireless Personal …, 2017 - Springer
Most of the authentication protocols which have been proposed so far are vulnerable to
security attacks, and none of them provides non-repudiation property. Therefore, this paper …

Quantum‐resistance authentication in centralized cognitive radio networks

S Bakhtiari Chehelcheshmeh… - Security and …, 2016 - Wiley Online Library
This paper presents a new method for mutual authentication in centralized cognitive radio
networks. In doing so, we analyzed the proposed scheme in terms of security and …

Formal analysis of the signal protocol using the scyther tool

NZ Almuzaini, I Ahmad - 2019 2nd International Conference on …, 2019 - ieeexplore.ieee.org
Signal is a popular cryptographic protocol designed by the Open Whisper System that
delivers end-to-end encryption for instant messaging (IM) conversations. Furthermore …

基于安全协议代码的形式化辅助建模研究.

葛艺, 黄文超, 熊焰 - Application Research of Computers …, 2023 - search.ebscohost.com
随着安全协议形式化分析技术的不断发展, 利用工具自动验证虽已得到实现,
但建模环节仍需依赖专业人员手工建模, 难度大且成本高, 限制了此技术的进一步推广 …