Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: WebAuthn.

Zeitschriftenartikel zum Thema „WebAuthn“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-21 Zeitschriftenartikel für die Forschung zum Thema "WebAuthn" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Dourado, Martiño Rivera, Marcos Gestal, and José M. Vázquez-Naya. "Implementing a Web Application for W3C WebAuthn Protocol Testing." Proceedings 54, no. 1 (2020): 5. http://dx.doi.org/10.3390/proceedings2020054005.

Der volle Inhalt der Quelle
Annotation:
During the last few years, the FIDO Alliance and the W3C have been working on a new standard called WebAuthn that aims to substitute the obsolete password as an authentication method by using physical security keys instead. Due to its recent design, the standard is still changing and so are the needs for protocol testing. This research has driven the development of a web application that supports the standard and gives extensive information to the user. This tool can be used by WebAuthn developers and researchers, helping them to debug concrete use cases with no need for an ad hoc implementati
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ravikanth Reddy Gudipati. "Implementing a multi-tenant FIDO relying party server: Architecture, security, and scalability considerations." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 765–73. https://doi.org/10.30574/wjaets.2025.15.1.0304.

Der volle Inhalt der Quelle
Annotation:
The transition to passwordless authentication using FIDO standards marks a transformative shift in modern security architecture, particularly in multi-tenant environments. This technical exploration delves into the comprehensive implementation considerations for building robust multi-tenant FIDO Relying Party (RP) servers. The content addresses key architectural components, including WebAuthn and CTAP protocol integration, database architecture models, tenant isolation strategies, and identity federation mechanisms. Critical security aspects, including cross-tenant protection and audit logging
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Krishnapatnam, Mahendra. "Next-Generation Identity Security in Healthcare: A Passkey-Based Approach." International Journal of Computing and Engineering 7, no. 3 (2025): 23–33. https://doi.org/10.47941/ijce.2701.

Der volle Inhalt der Quelle
Annotation:
The healthcare industry faces escalating cybersecurity threats, particularly targeting identity and access management (IAM) systems reliant on vulnerable password-based authentication. This paper proposes a next-generation solution leveraging passkeys, based on FIDO2 and WebAuthn protocols, to establish a passwordless authentication framework. We explore the technical architecture, device-bound authentication mechanisms, interoperability challenges, and compliance with HIPAA and NIST standards. Through case study analysis and industry benchmarking, we demonstrate that passkey adoption signific
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kepkowski, Michal, Lucjan Hanzlik, Ian Wood, and Mohamed Ali Kaafar. "How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 705–26. http://dx.doi.org/10.56553/popets-2022-0129.

Der volle Inhalt der Quelle
Annotation:
This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that allows attackers to link user accounts stored in vulnerable authenticators, a serious privacy concern. FIDO2 is a new standard specified by the FIDO industry alliance for secure token online authentication. It complements the W3C WebAuthn specification by providing means to use a USB token or other authenticator (which holds the secret authenticating material and implements FIDO protocols) as a second factor during the authentication process. From a cryptographic perspective, the protocol is a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Sandeep, Phanireddy. "Securing Modern Web Applications: Technologies, Threats, and Best Practices." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 6 (2024): 1–14. https://doi.org/10.5281/zenodo.14787324.

Der volle Inhalt der Quelle
Annotation:
Web Applications are now the foundation of many sectors today because they offer essential user services to the global population. However, as more organizations and individuals have started using these applications, they have become favorite points of call for hackers with security implications. This paper aims at describing the contemporary Web Application Security with emphasis on OAuth 2.0, WebAuthn, SSL/TLS, and Zero Trust Architecture. Many of the website threats are described, including the cross- site scripting (XSS) and SQL injection, and the issues of protection are considered, refle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kedarnath Goud Kothinti. "Mitigating One-Time Passcode (OTP) Fraud: Strengthening authentication against emerging threats." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1368–78. https://doi.org/10.30574/wjarr.2025.26.1.1181.

Der volle Inhalt der Quelle
Annotation:
This article provides a comprehensive examination of the evolving threat landscape surrounding One-Time Passcode (OTP) fraud in financial services and presents advanced mitigation strategies to strengthen authentication security. As financial institutions increasingly rely on OTP-based authentication methods, sophisticated threat actors have developed effective techniques to bypass these security measures through SIM swapping, man-in-the-middle attacks, social engineering, and telecom-level vulnerabilities. The article analyzes these attack vectors while evaluating emerging countermeasures, in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ahmad, Adeel, Asier Aguado Corman, Hannah Short, et al. "The Second-Factor Authentication System at CERN." EPJ Web of Conferences 295 (2024): 04025. http://dx.doi.org/10.1051/epjconf/202429504025.

Der volle Inhalt der Quelle
Annotation:
In 2022, CERN ran its annual simulated phishing campaign in which 2000 users gave away their passwords. In a real phishing incident, this would have meant 2000 compromised accounts, unless they were protected by Two-Factor Authentication (2FA). In the same year, CERN introduced 2FA for accounts with access to critical services. The new login flow requires users to always authenticate with a 2FA token, either with Time-based one-time password (TOTP) or WebAuthn. This introduces a significant security improvement for the individual and for the laboratory. The previous flow enforced 2FA to access
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Heller, Stephen R. "WebAuthor 1.0." Journal of Chemical Information and Computer Sciences 36, no. 1 (1996): 154. http://dx.doi.org/10.1021/ci950358s.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Dr.A.Shaji, George. "The Dawn of Passkeys: Evaluating a Passwordless Future." Partners Universal Innovative Research Publication (PUIRP) 02, no. 01 (2024): 202–20. https://doi.org/10.5281/zenodo.10697886.

Der volle Inhalt der Quelle
Annotation:
For many years, passwords have dominated online authentication; but, due to their shortcomings—such as poor memorability, susceptibility to phishing attacks, and hacking—more secure solutions are being sought after. Passkeys are a new technique that provides password-free authentication via public key cryptography. This study assesses passkeys as a possible replacement for passwords and a means of achieving a future where passwords are less common. An outline of the main ideas is given in the abstract. The first section of the article gives background information on the current wid
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Der volle Inhalt der Quelle
Annotation:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Der volle Inhalt der Quelle
Annotation:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Rivera-Dourado, Martiño, M. Gestal, A. Pazos, and José Vázquez-Naya. "A Novel Protocol Using Captive Portals for FIDO2 Network Authentication." Applied sciences 14, no. 9 (2024): 3610. https://doi.org/10.3390/app14093610.

Der volle Inhalt der Quelle
Annotation:
FIDO2 authentication is starting to be applied in numerous web authentication services, aiming to replace passwords and their known vulnerabilities. However, this new authentication method has not been integrated yet with network authentication systems. In this paper, we introduce FIDO2CAP: FIDO2 Captive-portal Authentication Protocol. Our proposal describes a novel protocol for captive-portal network authentication using FIDO2 Authenticators as security keys and passkeys. For validating our proposal, we have developed a prototype of FIDO2CAP authentication in a mock scenario. Using this proto
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Der volle Inhalt der Quelle
Annotation:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Der volle Inhalt der Quelle
Annotation:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Researcher. "FIDO2: A NEW ERA IN SECURE WEB AUTHENTICATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 841–58. https://doi.org/10.5281/zenodo.13479154.

Der volle Inhalt der Quelle
Annotation:
FIDO2 represents a paradigm shift in web authentication, addressing the longstanding vulnerabilities associated with traditional password-based systems. This article provides a comprehensive overview of FIDO2, exploring its technical architecture, security features, implementation challenges, and potential impact on cybersecurity. By leveraging public key cryptography and enabling passwordless authentication, FIDO2 offers robust protection against phishing, credential stuffing, and server-side breaches. The standard's integration of biometric factors and its alignment with privacy regulations
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Thakur, Mr Chirag. "ONLINE VOTING SYSTEM." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35518.

Der volle Inhalt der Quelle
Annotation:
With rapid growth in technologies the old voting methods can change to advanced voting methods. Online voting software is a modern solution that can efficiently and securely facilitate the voting process for various groups and organizations. The use of such software eliminates the need for physical polling stations, as voters can cast their ballots from anywhere with an internet connection. The benefits of using online voting software are many; it increases accessibility, saves time and resources, ensures accuracy and transparency, and supports a more democratic decision-making process. Eligib
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Diepgen, T. L., and G. Eysenbach. "Labeling and Filtering of Medical Information on the Internet." Methods of Information in Medicine 38, no. 02 (1999): 80–88. http://dx.doi.org/10.1055/s-0038-1634181.

Der volle Inhalt der Quelle
Annotation:
AbstractInternet information undergoes no quality controls and virtually anybody can publish anything. Because of this, it is difficult for searchers to take information retrieved from the Internet at face value. A related problem is the uncontrolled promotion of medical products on the Internet. A further problem of today’s Internet is that authors use no uniform keywords and other descriptive labels, which deteriorates the quality of search results. A solution for all these problems could be widespread use of descriptive and evaluative metainformation associated with medical Internet informa
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Marc, Ruef. "WebAuthn - The Future of Web Authentication." scip Labs, April 24, 2018. https://doi.org/10.5281/zenodo.3521889.

Der volle Inhalt der Quelle
Annotation:
W3C and FIDO Alliance have introduced a new specification. WebAuthn (Web Authentication) standardizes access to hardware mechanisms for the purpose of secure browser authentication. Major browser makers like Microsoft, Google, and Mozilla have expressed their support and are working on the first implementations. In order to use the mechanism with asymmetric cryptographic methods, registration using conventional password authentication is required first. WebAuthn addresses several classic security problems but also increases complexity in the browser.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Catalano, Christian, Andrea Chezzi, Vita Santa Barletta, and Franco Tommasi. "Defeating FIDO2/CTAP2/WebAuthn using browser in the middle and reflected cross site scripting." Journal of Computer Virology and Hacking Techniques 21, no. 1 (2025). https://doi.org/10.1007/s11416-025-00556-2.

Der volle Inhalt der Quelle
Annotation:
Abstract In our modern digital landscape, web browsers play a crucial role as gateways to large amounts of information and services. However, recent developments have demonstrated that the very features that make browsing convenient and seamless can be exploited by malicious actors through a potent threat vector known as the “Browser-in-the-Middle” (BitM) attack. Most of the Multi-Factor Authen- tication (MFA) security measures are shown to be ineffective to prevent BitM attacks. However, the FIDO2 Project that includes CTAP2 protocol that works together with the Web Authentication API (WebAut
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

-, Aditi Mallesh. "Ultra-Low-Latency IAM for Gaming and Online Betting: Optimizing Authentication for Scalability and Fraud Prevention." International Journal on Science and Technology 16, no. 1 (2025). https://doi.org/10.71097/ijsat.v16.i1.3004.

Der volle Inhalt der Quelle
Annotation:
Ultra-low-latency Identity and Access Management (IAM) has become a critical competitive differentiatorin the gaming and betting industry, where authentication speed directly impacts user experience andplatform revenue. This article examines an architectural approach to IAM that addresses the uniquechallenges of these environments, where even slight delays can lead to abandoned transactions, disruptedplayer immersion, lost betting opportunities, decreased session length, diminished in-app purchases,damaged platform reputation, and ultimately significant revenue loss across multiple revenue str
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Misra, Garima, B. Hazela, and B. K. Chaurasia. "Privacy Preserving Authentication of IoMT in Cloud Computing." EAI Endorsed Transactions on Internet of Things 10 (June 3, 2024). http://dx.doi.org/10.4108/eetiot.6235.

Der volle Inhalt der Quelle
Annotation:
INTRODUCTION: The Internet of Medical Things (IoMT) blends the healthcare industry with the IoT ecosystem and enables the creation, collection, transmission, and analysis of medical data through IoT networking. IoT networks consist of various healthcare IT systems, healthcare sensors, and healthcare management software. OBJECTIVES: The IoMT breathes new life into the healthcare system by building a network that is intelligent, accessible, integrated, and effective. Privacy-preserving authentication in IoMT is difficult due to the distributed communication environment of heterogeneous IoMT devi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!