[MISC n°98] Références de l’article « Tour d’horizon de l’authentification forte (MFA) »

Retrouvez ci-dessous la liste des références qui accompagnent l’article « Tour d’horizon de l’authentification forte (MFA) », publié dans MISC n°98 :

[TFA] TwoFactorAuth, List of websites and whether or not they support 2FA, https://twofactorauth.org/

[PIX] Pixie, Camera Based Two Factor Authentication Through Mobile and Wearable Devices, https://users.cs.fiu.edu/~carbunar/pixie.pdf

[LIP] Lip-password for Personal Identity Verification (Yiu-ming Cheung et al.), https://www.comp.hkbu.edu.hk/v1/proj/hkpfs/ymc/1/

[CAR] CardiacScan, http://www.buffalo.edu/news/releases/2017/09/034.html

[VET] Data Storage and Interaction using Magnetized Fabric, http://smartfabrics.cs.washington.edu/smartfabrics.pdf

[ACT] ActivPass, Your Daily Activity is Your Password, http://synrg.csl.illinois.edu/papers/activpass.pdf

[NIS] NIST Special Publication 800-63B, https://pages.nist.gov/800-63-3/sp800-63b.html

[AMA] Amazon wants you to pay by face, https://nakedsecurity.sophos.com/2016/03/16/amazon-wants-you-to-pay-by-face/

[NEC] NEC develops biometrics technology that uses sound to distinguish individually unique ear cavity shape, https://www.nec.com/en/press/201603/global_20160307_01.html

[SOU] Sound-Proof, Usable Two-Factor Authentication Based on Ambient Sound, https://arxiv.org/pdf/1503.03790v3.pdf

[HOT] HOTP : An HMAC-Based One-Time Password Algorithm, https://tools.ietf.org/html/rfc4226

[TOT] TOTP : Time-based One-time Password Algorithm, https://tools.ietf.org/html/draft-mraihi-totp-timebased-08

[HST] Hacking soft tokens, Bernhard MUELLER, https://gsec.hitb.org/materials/sg2016/whitepapers/Hacking%20Soft%20Tokens%20-%20Bernhard%20Mueller.pdf

[PIL] Proteus Digital Health, https://www.proteus.com/

[BST] BioStamp, https://www.mc10inc.com/

[BRA] Neurosky MindSet, Forget your password: The future is ‘passthoughts’, https://phys.org/news/2013-04-password-future-passthoughts.html

[NIM] Nimy bracelet, https://nymi.com/

[FAK] How clever social engineering can overcome two-factor authentication… or not ?, http://www.sorinmustaca.com/how-clever-social-engineering-can-overcome-two-factor-authentication/

[FBK] Here is how to hack Facebook using SS7 flaw, https://www.techworm.net/2016/06/hack-facebook-using-ss7-flaw.html

[BYP] Hacker Kevin Mitnick shows how to bypass 2FA, https://techcrunch.com/2018/05/10/hacker-kevin-mitnick-shows-how-to-bypass-2fa/

[HIB] HaveIBeenPwned ?, https://haveibeenpwned.com/