Hosseyni et al. - Google Patents
Formal Security Analysis of the OpenID FAPI 2.0 Security Profile with FAPI 2.0 Message SigningHosseyni et al.
View TXT- Document ID
- 11197259639975147378
- Author
- Hosseyni P
- Küsters R
- Würtele T
External Links
Snippet
Formal Security Analysis of the OpenID FAPI 2.0 Security Profile with FAPI 2.0 Message Signing,
FAPI-CIBA, Dynamic Client Registration and Management TECHNICAL REPORT Pedram
Hosseyni, Ralf Küsters, Tim Würtele Institute of Information Security – University of Stuttgart …
- 230000004044 response 0 description 73
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lux et al. | Distributed-ledger-based authentication with decentralized identifiers and verifiable credentials | |
Fett et al. | A comprehensive formal security analysis of OAuth 2.0 | |
Dietz et al. | {Origin-Bound} Certificates: A Fresh Approach to Strong Client Authentication for the Web | |
TWI470989B (en) | Method and apparatus for providing trusted single sing-on access to applications and internet-based services | |
JP5599910B2 (en) | Authentication delegation based on re-verification of cryptographic evidence | |
Fett et al. | An extensive formal security analysis of the openid financial-grade api | |
Carretero et al. | Federated identity architecture of the European eID system | |
Hu et al. | Security analysis of an attractive online authentication standard: FIDO UAF protocol | |
Mohamed et al. | Adaptive security architectural model for protecting identity federation in service oriented computing | |
Maganis et al. | Opaak: using mobile phones to limit anonymous identities online | |
Singh et al. | Identity management in cloud computing through claim-based solution | |
Heilman et al. | Openpubkey: Augmenting openid connect with user held signing keys | |
Bichsel et al. | An architecture for privacy-ABCs | |
Beuchelt | Securing Web applications, services, and servers | |
Paquin | U-prove technology overview v1. 1 | |
Tiwari et al. | Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Deeptha et al. | Extending OpenID connect towards mission critical applications | |
Tan et al. | A universal decentralized authentication and authorization protocol based on blockchain | |
Fongen et al. | The integration of trusted platform modules into a tactical identity management system | |
Hosseyni et al. | Formal security analysis of the OpenID FAPI 2.0 Security Profile with FAPI 2.0 Message Signing, FAPI-CIBA, Dynamic Client Registration and Management: technical report | |
Hosseyni et al. | Formal Security Analysis of the OpenID Financial-grade API 2.0 | |
Dietz et al. | Hardening Persona-Improving Federated Web Login. | |
Jeannot | Kerberos V5 | |
Bauer | Formal analysis of self-issued OpenID providers |