How many FIDO protocols are needed? Analysing the technology, security and compliance
Abstract
Supplementary Material
- Download
- 160.74 KB
References
Index Terms
- How many FIDO protocols are needed? Analysing the technology, security and compliance
Recommendations
Protecting FIDO Extensions Against Man-in-the-Middle Attacks
Emerging Technologies for Authorization and AuthenticationAbstractFIDO authentication has many advantages over password-based authentication, since it relies on proof of possession of a security key. It eliminates the need to remember long passwords and, in particular, is resistant to phishing attacks. Beyond ...
How many oblivious transfers are needed for secure multiparty computation?
CRYPTO'07: Proceedings of the 27th annual international cryptology conference on Advances in cryptologyOblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n ≥ 3 parties require each pair of parties to engage in a single OT for each gate in the ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Survey
Funding Sources
- H2020-SU-DS02-ERATOSTHENES
- HORIZON-CL4-2021-DATA-01-TRUSTEE
- HORIZON-CL4-2021-DATA-01-05-aerOS
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 527Total Downloads
- Downloads (Last 12 months)527
- Downloads (Last 6 weeks)71
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in