A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
EasyChair Preprint An extensive formal analysis of multi-factor authentication protocols An extensive formal analysis of multi-factor authentication protocols
2018
unpublished
Passwords are still the most widespread means for authenticating users, even though they have been shown to create huge security problems. This motivated the use of additional authentication mechanisms used in so-called multi-factor authentication protocols. In this paper we define a detailed threat model for this kind of protocols: while in classical protocol analysis attackers control the communication network, we take into account that many communications are performed over TLS channels,
fatcat:eq4th5vo6nd7fofm2kfqnajrbe