Binu et al., 2015
| Publication | Publication Date | Title |
|---|---|---|
| Wang et al. | EIDM: A ethereum-based cloud user identity management protocol | |
| CN102763111B (en) | Method and apparatus for trusted federated identity management and data access authorization | |
| US9673979B1 (en) | Hierarchical, deterministic, one-time login tokens | |
| Ghazizadeh et al. | A survey on security issues of federated identity in the cloud computing | |
| JP2020537218A (en) | Mobile Authentication Interoperability for Digital Certificates | |
| EP2572489B1 (en) | System and method for protecting access to authentication systems | |
| CN101507233A (en) | Method and apparatus for providing trusted single sign-on access to applications and internet-based services | |
| Beltran | Characterization of web single sign-on protocols | |
| Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
| Schwarz et al. | Feido: Recoverable FIDO2 tokens using electronic ids | |
| Singh et al. | Identity management in cloud computing through claim-based solution | |
| Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
| Abbas et al. | Identifying an OpenID anti‐phishing scheme for cyberspace | |
| Binu et al. | A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services | |
| Mitra et al. | TUSH-key: Transferable user secrets on hardware key | |
| Kim et al. | Secure user authentication based on the trusted platform for mobile devices | |
| Ghazizadeh et al. | Secure openID authentication model by using trusted computing | |
| Misra et al. | Privacy Preserving Authentication of IoMT in Cloud Computing | |
| Yasin et al. | Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT). | |
| Yang et al. | Context-Aware Phishing-Resistant Authentication for Federated Identity in Internet of Things Platforms | |
| Sethuraman et al. | TUSH-Key: Transferable User Secrets on Hardware Key | |
| Halpin et al. | Federated identity as capabilities | |
| US20250119275A1 (en) | Authentication tunneling mechanisms for remote connections | |
| Schwarz et al. | FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs (Extended Version) | |
| Bhandari et al. | Identity management frameworks for cloud |