Nist special publication 800-63-3-digital identity guidelines, 2017. ,
Password security: A case history, Communications of the ACM, vol.22, issue.11, pp.594-597, 1979. ,
Nist special publication 800-63b-digital identity guidelinesauthentication and lifecycle management, 2017. ,
, Google 2 Step
,
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes, Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12, pp.553-567, 2012. ,
,
Formal Analysis of the Fido 1.x Protocol, The 10th International Symposium on Foundations & Practice of Security, ser. Lecture Notes in Computer Science (LNCS), vol.10, p.2017 ,
Automated analysis of security protocols with global state, CoRR, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00955869
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM, pp.257-272, 2013. ,
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols, pp.728-734, 2013. ,
Modeling human errors in security protocols, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.325-340, 2016. ,
A complete characterization of secure human-server communication, IEEE 28th Computer Security Foundations Symposium, pp.199-213, 2015. ,
, G Suite updates-Improved phone prompts for 2-Step Verification
On the security of public key protocols, Proc. 22nd Symp. on Foundations of Computer Science (FOCS'81), pp.350-357, 1981. ,
, , 2018.
Spectre attacks: Exploiting speculative execution, 2018. ,
Mobile values, new names, and secure communication, SIGPLAN Not, vol.36, issue.3, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
The applied pi calculus: Mobile values, new names, and secure communication, Journal of the ACM, vol.65, issue.1, pp.1-1, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Modeling and verifying security protocols with the applied pi calculus and proverif, Foundations and Trends R in Privacy and Security, vol.1, issue.1-2, pp.1-135, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423760
,
, Proverif source files
Internet Engineering Task Force, Internet-Draft draft-ietf-tokbind-https-12, 2018. ,