Dec. 22, 2023, 2:10 a.m. | Marwa Mouallem, Ittay Eyal

cs.CR updates on arXiv.org arxiv.org

A myriad of authentication mechanisms embody a continuous evolution from
verbal passwords in ancient times to contemporary multi-factor authentication.
Nevertheless, digital asset heists and numerous identity theft cases illustrate
the urgent need to revisit the fundamentals of user authentication. We abstract
away credential details and formalize the general, common case of asynchronous
authentication, with unbounded message propagation time. Our model, which might
be of independent interest, allows for eventual message delivery, while
bounding execution time to maintain cryptographic guarantees. Given …

asset asynchronous authentication case cases continuous credential digital factor fundamentals general identity identity theft message multi-factor multi-factor authentication passwords theft urgent

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Director, Cybersecurity - Governance, Risk and Compliance (GRC)

@ Stanley Black & Decker | New Britain CT USA - 1000 Stanley Dr

Information Security Risk Metrics Lead

@ Live Nation Entertainment | Work At Home-Connecticut

IT Product Owner - Enterprise DevSec Platform (d/f/m)

@ Airbus | Hamburg - Finkenwerder

Senior Information Security Specialist

@ Arthur Grand Technologies Inc | Arlington, VA, United States

Information Security Controls SME

@ Sword | Aberdeen, Scotland, United Kingdom