Aug. 8, 2022, 1:20 a.m. | Steven J. Murdoch, Aydin Abadi

cs.CR updates on arXiv.org arxiv.org

Two-factor authentication (2FA) schemes that rely on a combination of
knowledge factors (e.g., PIN) and device possession have gained popularity.
Some of these schemes remain secure even against strong adversaries that (a)
observe the traffic between a client and server, and (b) have physical access
to the client's device, or its PIN, or breach the server. However, these
solutions have several shortcomings; namely, they (i) require a client to
remember multiple secret values to prove its identity, (ii) involve several …

authentication factor forward protocol

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Check Team Members / Cyber Consultants / Pen Testers

@ Resillion | Birmingham, United Kingdom

Security Officer Field Training Officer- Full Time (Harrah's LV)

@ Caesars Entertainment | Las Vegas, NV, United States

Cybersecurity Subject Matter Expert (SME)

@ SMS Data Products Group, Inc. | Fort Belvoir, VA, United States

AWS Security Engineer

@ IntelliPro Group Inc. | Palo Alto, CA

Information Security Analyst

@ Freudenberg Group | Alajuela