2022
DOI: 10.1007/978-3-031-17143-7_1
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Analysis of the FIDO2 Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Another approach aims at analysing the security of existing authentication protocols or standards, such as FIDO [33], [34], OAuth2.0 [35], 5G EAP-TLS [36] and Single Sign-On [22]. In this case, the analysis aims at validating a thirdparty authentication scheme that is widely used.…”
Section: Related Workmentioning
confidence: 99%
“…Another approach aims at analysing the security of existing authentication protocols or standards, such as FIDO [33], [34], OAuth2.0 [35], 5G EAP-TLS [36] and Single Sign-On [22]. In this case, the analysis aims at validating a thirdparty authentication scheme that is widely used.…”
Section: Related Workmentioning
confidence: 99%