FIDO2 Facing Kleptographic Threats By-Design
We analyze the popular in practice FIDO2 authentication scheme from the point of view of kleptographic threats that have not been addressed so far in the literature. We show that despite its spartan design and apparent efforts to make it immune to dishonest protocol participants, the unlinkability f...
Saved in:
| Main Authors: | Mirosław Kutyłowski, Anna Lauks-Dutka, Przemysław Kubiak, Marcin Zawada |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-12-01
|
| Series: | Applied Sciences |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/14/23/11371 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
by: Mohd Imran Md Yusop, et al.
Published: (2025-01-01) -
Post-Quantum Secure ID-Based (Threshold) Linkable Dual-Ring Signature and Its Application in Blockchain Transactions
by: Wen Gao, et al.
Published: (2024-10-01) -
“Facing the Monolith:” Virginia Woolf, Modernism and Impersonality
by: Paolo BUGLIANI
Published: (2018-06-01) -
Cloud data anonymous assured deletion approach based on blockchain
by: Shuangxing WANG, et al.
Published: (2021-03-01) -
Can Polish -no/-to Demote Discourse-Prominent Referents? Corpus Data vs. Acceptability
by: Iga Kościołek, et al.
Published: (2023-12-01)