2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS) 2020
DOI: 10.1109/icsess49938.2020.9237635
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Secure OpenID-Based RAAA User Authentication Protocol for Preventing Specific Web Attacks in Web Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Phishing attacks are also possible when a site that supports OpenID authorization is forged in order to obtain information about the user from the provider. Using the “hidden redirect” vulnerability, attackers can create the illusion for the user that the information is being requested by this site [ 38 ]. One-Time Password (OTP) is a one-time password method valid for only one authentication session.…”
Section: General Concept Of Information Protection Using Electronic K...mentioning
confidence: 99%
“…Phishing attacks are also possible when a site that supports OpenID authorization is forged in order to obtain information about the user from the provider. Using the “hidden redirect” vulnerability, attackers can create the illusion for the user that the information is being requested by this site [ 38 ]. One-Time Password (OTP) is a one-time password method valid for only one authentication session.…”
Section: General Concept Of Information Protection Using Electronic K...mentioning
confidence: 99%
“…However, this method is usually based on a weighted score function. Bilal et al [36] evaluated the performance of their security technique, namely Reverse Authentication Authorizing and Accounting, with the existing Single Sign-On (SSO) mechanism. The outcome and performance analysis suggested that the presented work is always better towards facilitating efficient authentication and robustness to prevent web attacks.…”
Section: ) Risk-based Access Control and Authenticationsmentioning
confidence: 99%
“…Most of the existing solutions are not focused on determining that most wearable devices do not provide a suitable interface for password-based authentication [23]- [26]. • Most studies have not focused on the practical implementation of frictionless authentication techniques in web-based applications [36]- [39].…”
Section: Problem Descriptionmentioning
confidence: 99%