Academic literature on the topic 'WebAuthn'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WebAuthn.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "WebAuthn"

1

Dourado, Martiño Rivera, Marcos Gestal, and José M. Vázquez-Naya. "Implementing a Web Application for W3C WebAuthn Protocol Testing." Proceedings 54, no. 1 (August 18, 2020): 5. http://dx.doi.org/10.3390/proceedings2020054005.

Full text
Abstract:
During the last few years, the FIDO Alliance and the W3C have been working on a new standard called WebAuthn that aims to substitute the obsolete password as an authentication method by using physical security keys instead. Due to its recent design, the standard is still changing and so are the needs for protocol testing. This research has driven the development of a web application that supports the standard and gives extensive information to the user. This tool can be used by WebAuthn developers and researchers, helping them to debug concrete use cases with no need for an ad hoc implementation.
APA, Harvard, Vancouver, ISO, and other styles
2

Heller, Stephen R. "WebAuthor 1.0." Journal of Chemical Information and Computer Sciences 36, no. 1 (January 1996): 154. http://dx.doi.org/10.1021/ci950358s.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Diepgen, T. L., and G. Eysenbach. "Labeling and Filtering of Medical Information on the Internet." Methods of Information in Medicine 38, no. 02 (1999): 80–88. http://dx.doi.org/10.1055/s-0038-1634181.

Full text
Abstract:
AbstractInternet information undergoes no quality controls and virtually anybody can publish anything. Because of this, it is difficult for searchers to take information retrieved from the Internet at face value. A related problem is the uncontrolled promotion of medical products on the Internet. A further problem of today’s Internet is that authors use no uniform keywords and other descriptive labels, which deteriorates the quality of search results. A solution for all these problems could be widespread use of descriptive and evaluative metainformation associated with medical Internet information. Our concept is based on a recently established infrastructure for assigning metadata to Internet information, the so-called PICS Standard (Platform for Internet Content Selection). We prototyped a PICS-based rating vocabulary for medical information (med-PICS), containing descriptive and evaluative categories, to be used by the webauthor and third-party label services (such as medical associations), respectively. We propose an international effort to assign metadata to medical Internet information.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "WebAuthn"

1

Chripko, Juraj. "Systém Excalibur - implementace SSO." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445588.

Full text
Abstract:
Cieľom systému Excalibur je presunúť autentifikáciu od hesiel používaných v súčastnosti ku bezheslovej budúcnosti. Zámerom tejto práce je integrácia systému Excalibur s webovými bezheslovými protokolmi SAML a FIDO2.    Štandard SAML bol integrovaný do systému Excalibur a úspešne otestovaný s niekoľkými známymi aplikáciami. Excalibur má na starosti samotnú autentifikáciu a manažment používateľov a SAML je použitý na predanie týchto informácii aplikáciam tretích strán.   FIDO2 je, na druhú stranu, kompletný autentifikačný štandard, ktorý môže byť do systému Excalibur integrovaný viacerými spôsobmi. Ako najsľubnejší spôsob sa javí výmena autentifikačného mechanizmu systému Excalibur za FIDO2, ale slabá podpora štandardu a chýbajúce funkcie to zatiaľ nedovoľujú.
APA, Harvard, Vancouver, ISO, and other styles
2

Gibson-Robinson, Thomas. "Analysing layered security protocols." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a.

Full text
Abstract:
Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the transport layer satisfies certain properties, such as confidentiality. Following this approach, we adapt the strand spaces model in order to analyse application-layer protocols that depend on an underlying secure transport layer, including unilaterally authenticating secure transport protocols, such as unilateral TLS. Further, we develop proof rules that enable us to prove the correctness of application-layer protocols that use either unilateral or bilateral secure transport protocols. We then illustrate these rules by proving the correctness of WebAuth, a single-sign-on protocol that makes extensive use of unilateral TLS. In this thesis we also present a full proof of the model's soundness. In particular, we prove that, subject to a suitable independence assumption, if there is an attack against the application-layer protocol when layered on top of a particular secure transport protocol, then there is an attack against the abstracted model of the application-layer protocol. In contrast to existing work in this area, the independence assumption consists of eight statically-checkable conditions, meaning that it can be checked statically, rather than having to consider all possible runs of the protocol. Lastly, we extend the model to allow protocols that consist of an arbitrary number of layers to be proven correct. In this case, we prove the correctness of the intermediate layers using the high-level strand spaces model, by abstracting away from the underlying transport-layers. Further, we extend the above soundness results in order to prove that the multi-layer approach is sound. We illustrate the effectiveness of our technique by proving the correctness of a couple of simple multi-layer protocols.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "WebAuthn"

1

Parker, Robert. Quarterdeck WebAuthor: User guide. Marina Del Ray, CA: Quarterdeck, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "WebAuthn"

1

Wagner, Paul, Kris Heid, and Jens Heider. "Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices." In 7th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010192703680375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klieme, Eric, Jonathan Wilke, Niklas van Dornick, and Christoph Meinel. "FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vasileios Grammatopoulos, Athanasios, Ilias Politis, and Christos Xenakis. "A web tool for analyzing FIDO2/WebAuthn Requests and Responses." In ARES 2021: The 16th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3465481.3469209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Neumann, Niklas, and Xiaoming Fu. "Diameter WebAuth: An AAA-Based Identity Management Framework for Web Applications." In IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. IEEE, 2008. http://dx.doi.org/10.1109/glocom.2008.ecp.368.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "WebAuthn"

1

Hodges, J., G. Mandyam, and M. Jones. Registries for Web Authentication (WebAuthn). RFC Editor, August 2020. http://dx.doi.org/10.17487/rfc8809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jones, M. CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms. RFC Editor, August 2020. http://dx.doi.org/10.17487/rfc8812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography