Abstract. Credentials like passwords or cryptographic key pairs are a means to prove one’s identity to a web server. A practical problem in this context is the question of how a user can temporarily delegate the right to use a credential to another person without revealing the secret. Related to this is the issue of sharing a single credential among members of a group such that all of them may use the credential, but no one actually gets to know it. This paper presents and compares several solutions to solve these problems. One is a client-side approach, while the other three are man-in-the-middle architectures. We have implemented one of these, the HTTP proxy variant, as a prototype. Our TLS Authentication Proxy is capable of transparently...
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years...
The paper discusses the methods of authentication used when interacting with third-party web service...
Existing client-authentication protocols deployed on the World Wide Web today are based on conventio...
On today's Internet, combining the end-to-end security of TLS with Content Delivery Networks (CDNs) ...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
Secure protocols for password-based user authentication are well-studied in the cryptographic litera...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...
International audienceNew trends highlight the use of delegated authentication solutions where ident...
Client platform infection poses a significant threat to secure user authentication. Com- bining vuln...
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web s...
The standard solution for mutual authentication between human users and servers on the internet is t...
The techniques of secured socket layer (SSL) with client-side certificates for commercial web sites ...
Abstract. The security guarantees provided by SSL/TLS depend on the correct authentication of server...
Delegation is frequently used in real world. In order to make it possible in on-line, the fact of de...
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years...
The paper discusses the methods of authentication used when interacting with third-party web service...
Existing client-authentication protocols deployed on the World Wide Web today are based on conventio...
On today's Internet, combining the end-to-end security of TLS with Content Delivery Networks (CDNs) ...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
Secure protocols for password-based user authentication are well-studied in the cryptographic litera...
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. I...
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...
International audienceNew trends highlight the use of delegated authentication solutions where ident...
Client platform infection poses a significant threat to secure user authentication. Com- bining vuln...
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web s...
The standard solution for mutual authentication between human users and servers on the internet is t...
The techniques of secured socket layer (SSL) with client-side certificates for commercial web sites ...
Abstract. The security guarantees provided by SSL/TLS depend on the correct authentication of server...
Delegation is frequently used in real world. In order to make it possible in on-line, the fact of de...
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years...
The paper discusses the methods of authentication used when interacting with third-party web service...
Existing client-authentication protocols deployed on the World Wide Web today are based on conventio...