A Formal Analysis of the FIDO2 Protocols

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 3
1. Verfasser: Guan, Jingjing (VerfasserIn)
Weitere Verfasser: Li, Hui (VerfasserIn), Ye, Haisong (VerfasserIn), Zhao, Ziming (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Polymorphic Protocols at the Example of Mitigating Web Bots 2022 See, August
Large Scale Analysis of DoH Deployment on the Internet 2022 García, Sebastián
PEA: Practical Private Epistasis Analysis Using MPC 2022 Hamacher, Kay
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems 2022 Liu, Zeyan
FLMJR: Improving Robustness of Federated Learning via Model Stability 2022 Guo, Qi
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses 2022 Tekgul, Buse G. A.
Can Industrial Intrusion Detection Be SIMPLE? 2022 Wolsing, Konrad
Detecting Cross-language Memory Management Issues in Rust 2022 Li, Zhuohua
Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked Passwords 2022 Mølmark-O’Connor, Daniel
A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation 2022 Aly, Abdelrahaman
Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet 2022 Yue, Feng
Efficient Proofs of Knowledge for Threshold Relations 2022 Avitabile, Gennaro
Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names 2022 Liu, Mingxuan
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations 2022 Blass, Erik-Oliver
Long-Short History of Gradients Is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning 2022 Gupta, Ashish
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems 2022 Fung, Clement
Towards Efficient Auditing for Real-Time Systems 2022 Bansal, Ayoosh
Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks 2022 Rasoamanana, Aina Toky
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks 2022 Groza, Bogdan
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps 2022 Borzacchiello, Luca
Alle Artikel auflisten