Auswahl der wissenschaftlichen Literatur zum Thema „WebAuthn“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "WebAuthn" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "WebAuthn"

1

Dourado, Martiño Rivera, Marcos Gestal und José M. Vázquez-Naya. „Implementing a Web Application for W3C WebAuthn Protocol Testing“. Proceedings 54, Nr. 1 (18.08.2020): 5. http://dx.doi.org/10.3390/proceedings2020054005.

Der volle Inhalt der Quelle
Annotation:
During the last few years, the FIDO Alliance and the W3C have been working on a new standard called WebAuthn that aims to substitute the obsolete password as an authentication method by using physical security keys instead. Due to its recent design, the standard is still changing and so are the needs for protocol testing. This research has driven the development of a web application that supports the standard and gives extensive information to the user. This tool can be used by WebAuthn developers and researchers, helping them to debug concrete use cases with no need for an ad hoc implementation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Heller, Stephen R. „WebAuthor 1.0“. Journal of Chemical Information and Computer Sciences 36, Nr. 1 (Januar 1996): 154. http://dx.doi.org/10.1021/ci950358s.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Diepgen, T. L., und G. Eysenbach. „Labeling and Filtering of Medical Information on the Internet“. Methods of Information in Medicine 38, Nr. 02 (1999): 80–88. http://dx.doi.org/10.1055/s-0038-1634181.

Der volle Inhalt der Quelle
Annotation:
AbstractInternet information undergoes no quality controls and virtually anybody can publish anything. Because of this, it is difficult for searchers to take information retrieved from the Internet at face value. A related problem is the uncontrolled promotion of medical products on the Internet. A further problem of today’s Internet is that authors use no uniform keywords and other descriptive labels, which deteriorates the quality of search results. A solution for all these problems could be widespread use of descriptive and evaluative metainformation associated with medical Internet information. Our concept is based on a recently established infrastructure for assigning metadata to Internet information, the so-called PICS Standard (Platform for Internet Content Selection). We prototyped a PICS-based rating vocabulary for medical information (med-PICS), containing descriptive and evaluative categories, to be used by the webauthor and third-party label services (such as medical associations), respectively. We propose an international effort to assign metadata to medical Internet information.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "WebAuthn"

1

Chripko, Juraj. „Systém Excalibur - implementace SSO“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445588.

Der volle Inhalt der Quelle
Annotation:
Cieľom systému Excalibur je presunúť autentifikáciu od hesiel používaných v súčastnosti ku bezheslovej budúcnosti. Zámerom tejto práce je integrácia systému Excalibur s webovými bezheslovými protokolmi SAML a FIDO2.    Štandard SAML bol integrovaný do systému Excalibur a úspešne otestovaný s niekoľkými známymi aplikáciami. Excalibur má na starosti samotnú autentifikáciu a manažment používateľov a SAML je použitý na predanie týchto informácii aplikáciam tretích strán.   FIDO2 je, na druhú stranu, kompletný autentifikačný štandard, ktorý môže byť do systému Excalibur integrovaný viacerými spôsobmi. Ako najsľubnejší spôsob sa javí výmena autentifikačného mechanizmu systému Excalibur za FIDO2, ale slabá podpora štandardu a chýbajúce funkcie to zatiaľ nedovoľujú.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Gibson-Robinson, Thomas. „Analysing layered security protocols“. Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.

Der volle Inhalt der Quelle
Annotation:
Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the transport layer satisfies certain properties, such as confidentiality. Following this approach, we adapt the strand spaces model in order to analyse application-layer protocols that depend on an underlying secure transport layer, including unilaterally authenticating secure transport protocols, such as unilateral TLS. Further, we develop proof rules that enable us to prove the correctness of application-layer protocols that use either unilateral or bilateral secure transport protocols. We then illustrate these rules by proving the correctness of WebAuth, a single-sign-on protocol that makes extensive use of unilateral TLS. In this thesis we also present a full proof of the model's soundness. In particular, we prove that, subject to a suitable independence assumption, if there is an attack against the application-layer protocol when layered on top of a particular secure transport protocol, then there is an attack against the abstracted model of the application-layer protocol. In contrast to existing work in this area, the independence assumption consists of eight statically-checkable conditions, meaning that it can be checked statically, rather than having to consider all possible runs of the protocol. Lastly, we extend the model to allow protocols that consist of an arbitrary number of layers to be proven correct. In this case, we prove the correctness of the intermediate layers using the high-level strand spaces model, by abstracting away from the underlying transport-layers. Further, we extend the above soundness results in order to prove that the multi-layer approach is sound. We illustrate the effectiveness of our technique by proving the correctness of a couple of simple multi-layer protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "WebAuthn"

1

Parker, Robert. Quarterdeck WebAuthor: User guide. Marina Del Ray, CA: Quarterdeck, 1995.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "WebAuthn"

1

Wagner, Paul, Kris Heid und Jens Heider. „Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices“. In 7th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010192703680375.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Klieme, Eric, Jonathan Wilke, Niklas van Dornick und Christoph Meinel. „FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication“. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00254.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Vasileios Grammatopoulos, Athanasios, Ilias Politis und Christos Xenakis. „A web tool for analyzing FIDO2/WebAuthn Requests and Responses“. In ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3465481.3469209.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Neumann, Niklas, und Xiaoming Fu. „Diameter WebAuth: An AAA-Based Identity Management Framework for Web Applications“. In IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. IEEE, 2008. http://dx.doi.org/10.1109/glocom.2008.ecp.368.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "WebAuthn"

1

Hodges, J., G. Mandyam und M. Jones. Registries for Web Authentication (WebAuthn). RFC Editor, August 2020. http://dx.doi.org/10.17487/rfc8809.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Jones, M. CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms. RFC Editor, August 2020. http://dx.doi.org/10.17487/rfc8812.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie