How many FIDO protocols are needed? Analysing the technology, security and compliance

A Angelogianni, I Politis, C Xenakis - ACM Computing Surveys, 2024 - dl.acm.org
To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap
between user friendly interfaces and advanced security features, the Fast IDentity Online …

Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity

MIM Yusop, NH Kamarudin, NHS Suhaimi… - IEEE …, 2025 - ieeexplore.ieee.org
As reliance on digital services grows, traditional password-based authentication methods
have been increasingly scrutinized due to their susceptibility to cyber-attacks, including …

Fast {IDentity} Online with Anonymous Credentials ({{{{{FIDO-AC}}}}})

WZ Yeoh, M Kepkowski, G Heide, D Kaafar… - 32nd USENIX Security …, 2023 - usenix.org
Web authentication is a critical component of today's Internet and the digital world we
interact with. The FIDO2 protocol enables users to leverage common devices to easily …

How many FIDO protocols are needed? Surveying the design, security and market perspectives

A Angelogianni, I Politis, C Xenakis - arxiv preprint arxiv:2107.00577, 2021 - arxiv.org
Unequivocally, a single man in possession of a strong password is not enough to solve the
issue of security. Studies indicate that passwords have been subjected to various attacks …

[CITAAT][C] Development of a secure multi-factor authentication algorithm for mobile money applications

G Ali - 2023 - NM-AIST