Quantum-safe account recovery for webauthn
D Stebila, S Wilson - Proceedings of the 19th ACM Asia Conference on …, 2024 - dl.acm.org
WebAuthn is a passwordless authentication protocol which allows users to authenticate to
online services using public-key cryptography. Users prove their identity by signing a …
online services using public-key cryptography. Users prove their identity by signing a …
A Comparative Long-Term Study of Fallback Authentication Schemes
Fallback authentication, the process of re-establishing access to an account when the
primary authenticator is unavailable, holds critical significance. Approaches range from …
primary authenticator is unavailable, holds critical significance. Approaches range from …
Challenges with passwordless FIDO2 in an enterprise setting: A usability study
Fast Identity Online 2 (FIDO2), a modern authentication protocol, is gaining popularity as a
default strong authentication mechanism. It has been recognized as a leading candidate to …
default strong authentication mechanism. It has been recognized as a leading candidate to …
Accountable authentication with privacy protection: The Larch system for universal login
Credential compromise is hard to detect and hard to mitigate. To address this problem, we
present larch, an accountable authentication framework with strong security and privacy …
present larch, an accountable authentication framework with strong security and privacy …
SoK: Web3 Recovery Mechanisms
Account recovery enables users to regain access to their accounts when they lose their
authentication credentials. While account recovery is well established and extensively …
authentication credentials. While account recovery is well established and extensively …
Post-Quantum Account Recovery for Passwordless Authentication
SML Wilson - 2023 - uwspace.uwaterloo.ca
WebAuthn is a passwordless authentication protocol which allows users to authenticate to
online services using public-key cryptography. Users prove their identity based on …
online services using public-key cryptography. Users prove their identity based on …
Secure Systems from Insecure Components
E Dauterman - 2024 - search.proquest.com
In many computer systems today, an attacker that compromises just one system component
can steal many users' data. Unfortunately, past experience shows that attackers are very …
can steal many users' data. Unfortunately, past experience shows that attackers are very …
[PDF][PDF] Password Security Reinforcement via Combining Unicode Character Set
X Nan - 2024 - waseda.repo.nii.ac.jp
Today's online passwords are mainly comprised of ASCII characters, even for users whose
main languages are not English. This research firstly analyzes drawbacks of new …
main languages are not English. This research firstly analyzes drawbacks of new …
[PDF][PDF] Toward Cloud-based FIDO Authentication with Secure Credentials Recovery
M Shiraishi, T Shinagawa - os.is.su-tokyo.ac.jp
ABSTRACT FIDO is an alternative to password authentication for logging into web services
securely through public key authentication. However, credentials for FIDO is unique to …
securely through public key authentication. However, credentials for FIDO is unique to …
フィッシング耐性のある FIDO 認証について
森山光一, 板倉景子 - 日本セキュリティ・マネジメント学会誌, 2023 - jstage.jst.go.jp
抄録 本稿では, FIDO (ファイド) アライアンスが W3C (World Wide Web Consortium)
と共に推進する FIDO 認証について解説する. **年, フィッシング攻撃などによる不**アクセスへの …
と共に推進する FIDO 認証について解説する. **年, フィッシング攻撃などによる不**アクセスへの …