Security Keys: Modern Security Feature of Web
نویسندگان
چکیده
Security providing devices that are used to protect against multiple threats like man-in-the-middle attack and phishing are known as ―security keys‖. With the help of security keys, user can register himself with any kind of online services that works with this protocol. If we install these security keys in some devices, deployment, implementation and use becomes very easy. We can also see the security keys in some browsers like chrome, Mozilla, even in some online services as well. These keys provide more satisfaction to user with the help of higher security level. This work is all about security keys which are second-factor devices that are used to improve the state of the art for authentication purpose for real consumers in terms of privacy, security, and usability.
منابع مشابه
Security Keys: Practical Cryptographic Second Factors for the Modern Web
“Security Keys” are second-factor devices that protect users against phishing and man-in-the-middle attacks. Users carry a single device and can self-register it with any online service that supports the protocol. The devices are simple to implement and deploy, simple to use, privacy preserving, and secure against strong attackers. We have shipped support for Security Keys in the Chrome web bro...
متن کاملTowards Enhancing Web Application Security Using Trusted Execution
The web continues to serve as a powerful medium through which various services and resources can be exposed or consumed through web applications. Web application platforms such as webinos facilitate communication between the various smart devices in a personal network. Although modern web applications use various cryptographic techniques for authentication and encryption, the security of these ...
متن کاملAnalyzing new features of infected web content in detection of malicious web pages
Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017