Recently, technology has spread more than before and become one of the basic necessities in our lives. With the expansion of technology, launching cyberattacks has emerged as a way to eavesdrop, impersonate, and penetrate systems to get sensitive information. In this paper, we aim to enhance the security for user authentication in Open Authorization 2.0 (OAuth 2.0) by using the Intel Software Guard Extensions (Intel SGX) tool, which helps protect user credentials from malicious attacks. The Intel SGX tool helps systems store and save codes and data inside protected containers called enclaves.There is an open source tool for Intel SGX called OpenSGX, which emulates an Intel SGX hardware component. OAuth 2.0 is a protocol that allows a user t...
Using passwords for authentication has been proven vulnerable in countless security incidents. Hardw...
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used in pe...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Many millions of users routinely use Google, Facebook and Microsoft to log in to websites supporting...
Today, there is an increasing demand for authentication services to provide authentication to users ...
OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-enabled user a...
OpenID is a promising user-centric Web single sign-on protocol. According to the OpenID Foundation, ...
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted ...
The thesis Open Authentication aims to present in detail the open authorization protocol that could ...
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
An enhanced security for authentication is defined because it is vital that authentication is an ext...
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted ...
Security-critical applications constantly face threats from exploits in lower computing layers such ...
Passwords are by far the most widely-used mechanism for authenticating users on the web, out-perform...
Using passwords for authentication has been proven vulnerable in countless security incidents. Hardw...
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used in pe...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Many millions of users routinely use Google, Facebook and Microsoft to log in to websites supporting...
Today, there is an increasing demand for authentication services to provide authentication to users ...
OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-enabled user a...
OpenID is a promising user-centric Web single sign-on protocol. According to the OpenID Foundation, ...
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted ...
The thesis Open Authentication aims to present in detail the open authorization protocol that could ...
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
An enhanced security for authentication is defined because it is vital that authentication is an ext...
OpenID and OAuth are open and lightweight web single sign-on (SSO) protocols that have been adopted ...
Security-critical applications constantly face threats from exploits in lower computing layers such ...
Passwords are by far the most widely-used mechanism for authenticating users on the web, out-perform...
Using passwords for authentication has been proven vulnerable in countless security incidents. Hardw...
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used in pe...
International audienceA variety of applications are executing on a large untrusted computing base, w...