2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) 2017
DOI: 10.1109/compsac.2017.198
|View full text |Cite
|
Sign up to set email alerts
|

Research on Integrated Authentication Using Passwordless Authentication Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…However, these proposals often do not take into account realistic deployment or scalability expectations; most do not provide a proof of concept either. Other proposals often fall into a common pitfall of advocating for open-source or proprietary software, or some form of integration of such software into the authentication ecosystem [ 13 , 29 ]. While these studies sometimes do show improved security, alongside proof of concept, to some degree, the recommendation of highly specific and/or proprietary software as a replacement for a protocol or scheme is not completely practical [ 7 , 18 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
“…However, these proposals often do not take into account realistic deployment or scalability expectations; most do not provide a proof of concept either. Other proposals often fall into a common pitfall of advocating for open-source or proprietary software, or some form of integration of such software into the authentication ecosystem [ 13 , 29 ]. While these studies sometimes do show improved security, alongside proof of concept, to some degree, the recommendation of highly specific and/or proprietary software as a replacement for a protocol or scheme is not completely practical [ 7 , 18 ].…”
Section: Related Work and Significance Of This Studymentioning
confidence: 99%
“…Although there are several products for MFA, to the best of our knowledge, there is not a standardized way of integrating them into a Shibboleth IdP. Among MFA solutions for the Shibboleth framework, it is possible to find: FAME [17]; Multi-Context Broker (MCB) [18]; Authentication Flow Selection [19]; and the practical experiment described in [20]. FAME framework [17] enables multi-factor and multilevel authentication in Shibboleth.…”
Section: Related Workmentioning
confidence: 99%
“…In [20], the authors describe a practical experiment that integrates an external password-less authentication system based on FIDO2 in the Shibboleth framework. In the proposed solution, the Shibboleth IdP redirects the user client (browser) to the FIDO2 server.…”
Section: Related Workmentioning
confidence: 99%
“…Takamizawa [7] proposed a user authentication method for an e-learning system using topographical information from Google Maps. Morii et al [8] proposed an integrated authentication system without the use of password, adopting Fast Identity Online (FIDO), as an external authentication technique. Dubey et al [9] proposed a hybrid model, where fingerprint authentication is used with autocomplete function for accessing a specific website or information on the website.…”
Section: Related Workmentioning
confidence: 99%