Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Modern authentication schemes in smartphones and IoT devices: An empirical survey
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …
Is FIDO2 the kingslayer of user authentication? A comparative usability study of FIDO2 passwordless authentication
SG Lyastani, M Schilling, M Neumayr… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The newest contender for succeeding passwords as the incumbent web authentication
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
scheme is the FIDO2 standard. Jointly developed and backed by the FIDO Alliance and the …
SR-PEKS: Subversion-resistant public key encryption with keyword search
C Jiang, C Xu, Z Zhang, K Chen - IEEE Transactions on Cloud …, 2023 - ieeexplore.ieee.org
Public key encryption with keyword search (PEKS) provides secure searchable data
encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud …
encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud …
Token meets wallet: Formalizing privacy and revocation for FIDO2
The FIDO2 standard is a widely-used class of challenge-response type protocols that allows
to authenticate to an online service using a hardware token. Barbosa et al.(CRYPTO '21) …
to authenticate to an online service using a hardware token. Barbosa et al.(CRYPTO '21) …
A secure two-factor authentication scheme from password-protected hardware tokens
We investigate existing “password+ hardware token”-based authentication schemes
deployed in real-world applications and observe that they are vulnerable to critical threats …
deployed in real-world applications and observe that they are vulnerable to critical threats …
How not to handle keys: Timing attacks on FIDO authenticator privacy
This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication
protocol that allows attackers to link user accounts stored in vulnerable authenticators, a …
protocol that allows attackers to link user accounts stored in vulnerable authenticators, a …
A security and usability analysis of local attacks against fido2
The FIDO2 protocol aims to strengthen or replace password authentication using public-key
cryptography. FIDO2 has primarily focused on defending against attacks from afar by remote …
cryptography. FIDO2 has primarily focused on defending against attacks from afar by remote …
Notary: A device for secure transaction approval
Notary is a new hardware and software architecture for running isolated approval agents in
the form factor of a USB stick with a small display and buttons. Approval agents allow …
the form factor of a USB stick with a small display and buttons. Approval agents allow …
On the usability of authenticity checks for hardware security tokens
The final responsibility to verify whether a newly purchased hardware security token (HST) is
authentic and unmodified lies with the end user. However, recently reported attacks on such …
authentic and unmodified lies with the end user. However, recently reported attacks on such …
Reverse firewalls for adaptively secure MPC without setup
We study Multi-party computation (MPC) in the setting of subversion, where the adversary
tampers with the machines of honest parties. Our goal is to construct actively secure MPC …
tampers with the machines of honest parties. Our goal is to construct actively secure MPC …