Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability issue by enabling the users to login once using a set of username and password that allows an access into multiple websites. Among several SSO protocol, OpenID is said to offer flexibility and security. Unfortunately, the existing OpenID model is prone to phishing attack due to lack of countermeasures to ensure authenticity of OpenID provider. In view of the proliferation of phishing attack that exposed users to fraud website, information theft and unauthorized disclosure, this study attempts to identify and propose a suitable countermeasure in order to thwart phishing attack in OpenID environment. Therefore, this study intends to develop a p...
Current Web single sign-on (SSO) solutions impose a cognitive burden on web users and do not provide...
Current Web single sign-on (SSO) solutions impose a cognitive burden on web users and do not provide...
It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous ...
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability ...
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability ...
Single Sign-on (SSO) was introduced to overcome the issue of password memorability among users as re...
The problem of password memorability among users has led to the introduction of Single Sign-On (SSO)...
OpenID is an open and promising Web single sign-on solution; however, the interaction flows provided...
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted ...
Single Sign-On (SSO) is a solution where the authentication process is taken care of once by a third...
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted ...
OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-enabled user a...
Today internet users use a single identity to access multiple services. With single sign-on (SSO), u...
OpenID is a promising user-centric Web single sign-on protocol. According to the OpenID Foundation, ...
Abstract. Single Sign-On (SSO) systems simplify login procedures by using an an Identity Provider (I...
Current Web single sign-on (SSO) solutions impose a cognitive burden on web users and do not provide...
Current Web single sign-on (SSO) solutions impose a cognitive burden on web users and do not provide...
It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous ...
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability ...
Single Sign-on (SSO) authentication was introduced to overcome the problem of password memorability ...
Single Sign-on (SSO) was introduced to overcome the issue of password memorability among users as re...
The problem of password memorability among users has led to the introduction of Single Sign-On (SSO)...
OpenID is an open and promising Web single sign-on solution; however, the interaction flows provided...
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted ...
Single Sign-On (SSO) is a solution where the authentication process is taken care of once by a third...
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted ...
OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-enabled user a...
Today internet users use a single identity to access multiple services. With single sign-on (SSO), u...
OpenID is a promising user-centric Web single sign-on protocol. According to the OpenID Foundation, ...
Abstract. Single Sign-On (SSO) systems simplify login procedures by using an an Identity Provider (I...
Current Web single sign-on (SSO) solutions impose a cognitive burden on web users and do not provide...
Current Web single sign-on (SSO) solutions impose a cognitive burden on web users and do not provide...
It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous ...