Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols

被引:1
|
作者
Wang, Kailong [1 ]
机构
[1] Natl Univ Singapore, Singapore, Singapore
关键词
D O I
10.1007/978-3-030-02450-5_31
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Web authentication protocols have become the basis in safeguarding the users' sensitive data managed by the web services. Provided the critical role of web authentication protocols, their security and privacy properties deserve rigorous analysis. In this work, the target is to formally analyze both security and privacy properties of web authentication protocol designs and implementations.
引用
收藏
页码:441 / 445
页数:5
相关论文
共 50 条
  • [1] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [2] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    [J]. New Generation Computing, 2001, 19 : 283 - 299
  • [3] A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems
    Simoens, Koen
    Bringer, Julien
    Chabanne, Herve
    Seys, Stefaan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 833 - 841
  • [4] Privacy and authentication protocols for PCS
    Mohan, S
    [J]. IEEE PERSONAL COMMUNICATIONS, 1996, 3 (05): : 34 - 38
  • [5] Design and Implementation of A RFID Security Authentication Protocol
    Zhang, Lei
    Xiao, Zicong
    [J]. 2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 102 - 105
  • [6] An IDE for the Design, Verification and Implementation of Security Protocols
    Garcia, Remi
    Modesti, Paolo
    [J]. 2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2017), 2017, : 157 - 163
  • [7] Multi-party authentication for Web services: Protocols, implementation and evaluation
    Zhang, DC
    Xu, J
    [J]. SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, : 227 - 234
  • [8] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [9] Privacy of recent RFID authentication protocols
    Ouafi, Khaled
    Phan, Raphael C. -W.
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 263 - +
  • [10] The design and implementation of web mining in web sites security
    Jian Li
    Guo-yin Zhang
    Guo-chang Gu
    Jian-li Li
    [J]. Journal of Marine Science and Application, 2003, 2 (1) : 81 - 86