{"id":"https://openalex.org/W4393224639","doi":"https://doi.org/10.1145/3654661","title":"How many FIDO protocols are needed? Analysing the technology, security and compliance","display_name":"How many FIDO protocols are needed? Analysing the technology, security and compliance","publication_year":2024,"publication_date":"2024-03-27","ids":{"openalex":"https://openalex.org/W4393224639","doi":"https://doi.org/10.1145/3654661"},"language":"en","primary_location":{"id":"doi:10.1145/3654661","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3654661","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3654661","source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3654661","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080093097","display_name":"Anna Angelogianni","orcid":"https://orcid.org/0000-0002-0009-4479"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Anna Angelogianni","raw_affiliation_strings":["Digital Systems, University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Digital Systems, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079427072","display_name":"Ilias Politis","orcid":"https://orcid.org/0000-0002-1083-0345"},"institutions":[{"id":"https://openalex.org/I4210091604","display_name":"Health Innovations (United States)","ror":"https://ror.org/00darzp70","country_code":"US","type":"company","lineage":["https://openalex.org/I4210091604"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ilias Politis","raw_affiliation_strings":["InQbit Innovations SRL,  Bucharest Romania","InQbit Innovations SRL, Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"InQbit Innovations SRL,  Bucharest Romania","institution_ids":["https://openalex.org/I4210091604"]},{"raw_affiliation_string":"InQbit Innovations SRL, Bucharest, Romania","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032247032","display_name":"Christos Xenakis","orcid":"https://orcid.org/0000-0001-6718-122X"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Xenakis","raw_affiliation_strings":["University of Piraeus,  Piraeus Greece","University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"University of Piraeus,  Piraeus Greece","institution_ids":["https://openalex.org/I154757721"]},{"raw_affiliation_string":"University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080093097"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":null,"apc_paid":null,"fwci":7.7942,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.97172614,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"56","issue":"8","first_page":"1","last_page":"51"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8888939023017883},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.6341208219528198},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5027084350585938}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8888939023017883},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.6341208219528198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5027084350585938},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3654661","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3654661","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3654661","source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3654661","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3654661","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3654661","source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Computing Surveys","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4393224639.pdf","grobid_xml":"https://content.openalex.org/works/W4393224639.grobid-xml"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W2047635359","https://openalex.org/W2523257145","https://openalex.org/W2544337092","https://openalex.org/W2589570111","https://openalex.org/W2606810880","https://openalex.org/W2607361454","https://openalex.org/W2612410409","https://openalex.org/W2691059671","https://openalex.org/W2741727270","https://openalex.org/W2750910987","https://openalex.org/W2751268297","https://openalex.org/W2773159373","https://openalex.org/W2784017372","https://openalex.org/W2792408974","https://openalex.org/W2793937183","https://openalex.org/W2796757199","https://openalex.org/W2897464247","https://openalex.org/W2898188678","https://openalex.org/W2901650006","https://openalex.org/W2910318164","https://openalex.org/W2917757812","https://openalex.org/W2948223023","https://openalex.org/W2963510291","https://openalex.org/W2976189582","https://openalex.org/W2984725835","https://openalex.org/W2986474575","https://openalex.org/W2997897218","https://openalex.org/W3004890695","https://openalex.org/W3012237669","https://openalex.org/W3013875477","https://openalex.org/W3015349823","https://openalex.org/W3032062187","https://openalex.org/W3082594886","https://openalex.org/W3090820577","https://openalex.org/W3096471656","https://openalex.org/W3118594333","https://openalex.org/W3119856704","https://openalex.org/W3130065063","https://openalex.org/W3132079648","https://openalex.org/W3132335402","https://openalex.org/W3133367416","https://openalex.org/W3134630343","https://openalex.org/W3137615531","https://openalex.org/W3153968739","https://openalex.org/W3162979535","https://openalex.org/W3175139634","https://openalex.org/W3186249566","https://openalex.org/W3194457769","https://openalex.org/W4205651683","https://openalex.org/W4206109607","https://openalex.org/W4225086694","https://openalex.org/W4250945820","https://openalex.org/W4292158303","https://openalex.org/W4293783534","https://openalex.org/W4297659119","https://openalex.org/W4308213609","https://openalex.org/W4308361269","https://openalex.org/W4312919281","https://openalex.org/W4321176237","https://openalex.org/W4384948711","https://openalex.org/W4385187259","https://openalex.org/W4388483098","https://openalex.org/W4388858368"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2410395228","https://openalex.org/W2390279801","https://openalex.org/W3125941065","https://openalex.org/W2358668433","https://openalex.org/W2484615095","https://openalex.org/W4366449942","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278"],"abstract_inverted_index":{"To":[0,71,105],"overcome":[1],"the":[2,11,21,40,45,48,60,76,87,110,115,120,124,129,134,138,143,146,162,193],"security":[3,19,130],"vulnerabilities":[4],"caused":[5],"by":[6,123,137,171],"weak":[7],"passwords,":[8],"thus":[9],"bridge":[10],"gap":[12],"between":[13],"user":[14],"friendly":[15],"interfaces":[16],"and":[17,91,94,140,151],"advanced":[18],"features,":[20],"Fast":[22],"IDentity":[23],"Online":[24],"(FIDO)":[25],"alliance":[26],"defined":[27],"a":[28,82,108,176],"number":[29],"of":[30,39,50,145],"authentication":[31,178],"protocols.":[32,155],"The":[33],"existing":[34,116],"literature":[35],"leverages":[36],"all":[37],"versions":[38],"FIDO":[41,53,125,147],"protocols,":[42],"without":[43],"indicating":[44],"reasons":[46],"behind":[47],"choice":[49],"each":[51],"individual":[52],"protocol":[54,63,89,101],"(i.e.,":[55],"U2F,":[56],"UAF,":[57],"FIDO2).":[58],"Inevitably,":[59],"question":[61],"\u201cwhich":[62],"is":[64,161],"more":[65],"suitable":[66],"per":[67],"case\u201d":[68],"becomes":[69],"significant.":[70],"provide":[72],"an":[73],"answer":[74],"to":[75,97,107,184,191],"previous":[77],"question,":[78],"this":[79],"article":[80],"performs":[81],"thorough":[83],"comparative":[84],"analysis":[85],"on":[86,128],"different":[88],"specifications":[90,121],"their":[92],"technological":[93],"market":[95],"support,":[96],"identify":[98],"whether":[99],"any":[100],"has":[102],"become":[103],"obsolete.":[104],"reach":[106],"conclusion,":[109],"proposed":[111],"approach":[112],"(i)":[113],"explores":[114],"literature,":[117],"(ii)":[118],"analyses":[119],"released":[122],"Alliance,":[126],"elaborating":[127],"characteristics,":[131],"(iii)":[132],"inspects":[133],"technical":[135],"adoption":[136],"industry":[139],"(iv)":[141],"investigates":[142],"compliance":[144],"with":[148],"standards,":[149],"regulations":[150],"other":[152],"identity":[153],"verification":[154],"Our":[156],"results":[157],"indicate":[158],"that":[159],"FIDO2":[160],"most":[163],"widely":[164],"adopted":[165],"solution;":[166],"however,":[167],"U2F":[168],"remains":[169],"supported":[170],"numerous":[172],"web":[173],"services":[174],"as":[175],"two-factor":[177],"(2FA)":[179],"choice,":[180],"while":[181],"UAF":[182],"continues":[183],"be":[185],"utilised":[186],"in":[187],"mobile":[188],"clients":[189],"seeking":[190],"offer":[192],"Transaction":[194],"Confirmation":[195],"feature.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
