Gao et al., 2020 - Google Patents
A research of security in website account bindingGao et al., 2020
- Document ID
- 14628378309778186484
- Author
- Gao X
- Yu L
- He H
- Wang X
- Wang Y
- Publication year
- Publication venue
- Journal of Information Security and Applications
External Links
Snippet
More and more websites have allowed users to bind a third-party account, mobile phone or email address. Users can log in to different websites through the bound third-party account or mobile phone, or recover password via the bound email address. So security issues in the …
- 230000027455 binding 0 title abstract description 141
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Analysing the Security of Google’s implementation of OpenID Connect | |
Sun et al. | The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems | |
Li et al. | Security issues in OAuth 2.0 SSO implementations | |
Fett et al. | A comprehensive formal security analysis of OAuth 2.0 | |
Huang et al. | Using one-time passwords to prevent password phishing attacks | |
CN101227468B (en) | Method, device and system for authenticating user to network | |
Armando et al. | An authentication flaw in browser-based single sign-on protocols: Impact and remediations | |
Navas et al. | Understanding and mitigating OpenID Connect threats | |
Singh | Review of e-commerce security challenges | |
Mladenov et al. | On the security of modern single sign-on protocols: Second-order vulnerabilities in openid connect | |
Van Delft et al. | A security analysis of OpenID | |
Liu et al. | Android single sign-on security: Issues, taxonomy and directions | |
Zhao et al. | Explicit authentication response considered harmful | |
Badra et al. | Phishing attacks and solutions | |
Li et al. | Mitigating CSRF attacks on OAuth 2.0 systems | |
Gao et al. | A research of security in website account binding | |
Ellahi et al. | Analyzing 2FA phishing attacks and their prevention techniques | |
Nagpal et al. | Preventive measures for securing web applications using broken authentication and session management attacks: A study | |
Leicher et al. | Trusted computing enhanced openid | |
Deeptha et al. | Extending OpenID connect towards mission critical applications | |
Johnston | Authentication and session management on the web | |
Hackenjos et al. | FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks | |
Holtmann | Single Sign-On Security: Security Analysis of Real-Life OpenID Connect Implementations | |
Almi | Web Server Security and Survey on Web Application Security | |
Haque et al. | Enhancement of web security against external attack |