How many FIDO protocols are needed? Analysing the technology, security and compliance.
Anna AngelogianniIlias PolitisChristos XenakisPublished in: ACM Comput. Surv. (2024)
Keyphrases
- communication protocols
- security protocols
- authentication protocol
- cost effective
- data encryption
- key agreement protocol
- intrusion detection
- case study
- information security
- intrusion detection and prevention
- security architecture
- security properties
- cryptographic protocols
- network security
- security analysis
- security requirements
- data processing
- key distribution
- security issues
- key technologies
- security mechanisms
- digital rights management