2016
DOI: 10.1007/s10207-016-0348-7
|View full text |Cite
|
Sign up to set email alerts
|

Secure modular password authentication for the web using channel bindings

Abstract: Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…For example, our BPR protocol can be executed on top of the TLS channel established between the client and the server (cf. [29] for the technique on how to securely bind password-based protocols in the application layer to the TLS channel).…”
Section: An Efficient Bpr Protocol In the Standard Modelmentioning
confidence: 99%
“…For example, our BPR protocol can be executed on top of the TLS channel established between the client and the server (cf. [29] for the technique on how to securely bind password-based protocols in the application layer to the TLS channel).…”
Section: An Efficient Bpr Protocol In the Standard Modelmentioning
confidence: 99%
“…The author of [1] has suggested that the main focus of Content Access Control is that the system and resources are access only by the authorized parties. The author of [2] has suggested that authentication using password is most prominent and user-friendly authentication process. The author of [3] has suggested that Steganography is closely related to cryptography.…”
Section: Review Of Literaturementioning
confidence: 99%