SlideShare a Scribd company logo
FIDO UAF Overview
Cloud Authentication
Password might be
entered into untrusted
App / Web-site
(“phishing”)
1
Password could be stolen
from the server
2
Too many passwords to
remember
à re-use / cart
abandonment
3
Inconvenient to
type password on
phone
4
Password Issues
OTP vulnerable to real-
time MITM and MITB
attacks
1
SMS security questionable,
especially when Device is the
phone
2
OTP HW tokens are
expensive and people
don’t want another device
3
Inconvenient to type OTP
on phone
4
OTP Issues
Authentication silos
COMPLEXITY, REDUNDANCY, COSTS
App 2
New
App?
RP 1
RP 1
App 1
?
ApplicationsAuthentication Methods
How does FIDO UAF work?
Device
How does FIDO UAF work?
… …SE
How does FIDO UAF work?
Can recognize the user (i.e.
user verification), but doesn’t
have an identity proof of
the user.
Same Authenticator
as registered before?Same User as
enrolled before?
How does FIDO UAF work?
Same Authenticator
as registered before?Same User as
enrolled before?
Identity binding to be
done outside FIDO:
This this “John Doe
with customer ID X”.
Can recognize the user (i.e.
user verification), but doesn’t
have an identity proof of
the user.
How does FIDO UAF work?
Generate key pair in
Authenticator and give
public key to server
Verify user before
signing authentication
response
Provide cryptographic
proof of authenticator
model
Use Metadata to understand
Authenticator model security
characteristic
Define policy of
acceptable
AuthenticatorsUse site-specific
keys in order to
protect privacy
Knows user IDs for
registered web
sites
FIDO
Server
AppFIDO
Authenticator
Device Relying Party
Web
App
UAF Registration
Prepare0
FIDO
Authenticator
FIDO
Server
Web
App
App
Prepare0
UAF Registration
FIDO
Authenticator
FIDO
Server
Web
App
App
Prepare
UAF Registration
0
FIDO
Authenticator
FIDO
Server
Web
App
App
Legacy Auth +
Initiate Reg.
1
Prepare
UAF Registration
0
FIDO
Authenticator
FIDO
Server
Web
App
App
1
Prepare
UAF Registration
0
Legacy Auth +
Initiate Reg.
FIDO
Authenticator
FIDO
Server
Web
App
App
1
Prepare
2
UAF Registration
0
Legacy Auth +
Initiate Reg.
Reg. Request
+ Policy
FIDO
Authenticator
FIDO
Server
Web
App
App
1
pat@example.com
Pat Johnson
Link your fingerprint
Prepare
2
UAF Registration
0
Legacy Auth +
Initiate Reg.
Reg. Request
+ Policy
FIDO
Authenticator
FIDO
Server
Web
App
App
1
pat@example.com
Pat Johnson
Link your fingerprint
Prepare
2
3
Verify User &
Generate New
Key Pair
(specific to RP Webapp)
UAF Registration
0
Legacy Auth +
Initiate Reg.
Reg. Request
+ Policy
FIDO
Authenticator
FIDO
Server
Web
App
App
1
pat@example.com
Pat Johnson
Link your fingerprint
Prepare
Reg. Request
+ Policy
2
3
Verify User &
Generate New
Key Pair
(specific to RP Webapp)
Reg.
Response
4
UAF Registration
0
Legacy Auth +
Initiate Reg.
Key Registration Data:
•  Hash(FinalChallenge)
•  AAID
•  Public key
•  KeyID
•  Registration Counter
•  Signature Counter
•  Signature (attestation key)
FinalChallenge=Hash(AppID | FacetID
| tlsData | challenge)
FIDO
Authenticator
FIDO
Server
Web
App
App
1
pat@example.com
Pat Johnson
Prepare
2
3
Verify User &
Generate New
Key Pair
(specific to RP Webapp)
Reg.
Response
4
Success
5
UAF Registration
0
Legacy Auth +
Initiate Reg.
Reg. Request
+ Policy
FIDO Building Blocks
FIDO USER DEVICE
FIDO CLIENT
RELYING PARTY
FIDO SERVER
Metadata Service
FIDO AUTHENTICATOR
WEB SERVERBROWSER / APP
Cryptographic
authentication key
reference DB
Authenticator
Metadata &
attestation trust store
Attestation key
Authentication keys
Update
UAF Protocol
TLS Server Key
ASM
AAID & Attestation
FIDO Authenticator
FIDO Authenticator
Using HW based crypto
Pure SW based implementation
Based on FP Sensor X
Based on Face Recognition alg. Y
AAID 1
AAID 2
Attestation Key 1
Attestation Key 2
AAID: Authenticator Attestation ID (=model name)
Privacy & Attestation
Bob’s FIDO Authenticator
Using HW based crypto
Based on FP Sensor X
FIDO SERVER RP1
FIDO SERVER RP2
Model A
Model A
Model A
Serial #
Attestation & Metadata
FIDO SERVERFIDO
AUTHENTICATOR
Metadata
Signed Attestation Object
Verify using trust anchor
included in Metadata
Understand Authenticator
security characteristic
by looking into Metadata
(and potentially other sources)
Authenticator Meta-Data
See fido-uaf-authnr-metadata
FIDO
Authenticator
FIDO
Server
Web
App
App
Prepare0
UAF Authentication
FIDO
Authenticator
FIDO
Server
Web
App
App
Prepare
UAF Authentication
0
FIDO
Authenticator
FIDO
Server
Web
App
App
Prepare
UAF Authentication
0
FIDO
Authenticator
FIDO
Server
Web
App
App
Prepare
UAF Authentication
0
FIDO
Authenticator
FIDO
Server
Web
App
App
Prepare
UAF Authentication
Initiate
Authentication
1
0
FIDO
Authenticator
FIDO
Server
Web
App
App
Prepare
UAF Authentication
Initiate
Authentication
1
Auth. Request
with Challenge
2
0
FIDO
Server
Web
App
App
Prepare
UAF Authentication
pat@example.com
Pat Johnson
Initiate
Authentication
1
3
Verify User &
Sign Challenge
(Key specific to RP
Webapp)
FIDO
Authenticator
Auth. Request
with Challenge
2
0
FIDO
Server
Web
App
App
Prepare
UAF Authentication
Pat Johnson
650 Castro Street
Mountain View, CA 94041
United States
Initiate
Authentication
1
FIDO
Authenticator
3
Verify User &
Sign Challenge
(Key specific to RP
Webapp)
Auth.
Response
4
Auth. Request
with Challenge
2
0
SignedData:
•  SignatureAlg
•  Hash(FinalChallenge)
•  Authenticator random
•  Signature Counter
•  Signature
FinalChallenge=Hash(AppID | FacetID
| tlsData | challenge)
FIDO
Server
Web
App
App
Prepare
UAF Authentication
pat@example.com
Pat Johnson
Payment complete!
Return to the merchant’s web
site to continue shopping
Return to the merchant
Initiate
Authentication
1
FIDO
Authenticator
3
Verify User &
Sign Challenge
(Key specific to RP
Webapp)
Auth. Request
with Challenge
2
Auth.
Response
4
Success
5
0
FIDO
Server
Browser or
Native App
FIDO
Authenticator Initiate Transaction
Authentication Response
+ Text Hash,
signed by User’s private key
Validate
Response &
Text Hash
using User’s Public Key
Authentication Request +
Transaction Text
2
4
5
Device Relying Party
1
3
Web
App
Display Text, Verify
User & Unlock
Private Key
(specific to User + RP Webapp)
Transaction Confirmation
SignedData:
•  SignatureAlg
•  Hash(FinalChallenge)
•  Authenticator random
•  Signature Counter
•  Hash(Transaction Text)
•  Signature
FinalChallenge=Hash(AppID | FacetID
| tlsData | challenge)
The Authenticator Concept
FIDO Authenticator
User
Verification /
Presence
Secure Display
Attestation Key
Authentication Key(s)
User
Injected at
manufacturing,
doesn’t change
Generated at
runtime (on
Registration)
Optional
Components
Using Secure Hardware
FIDO Authenticator in SIM Card
User Verification
(PIN)
SIM Card
Attestation Key
Authentication Key(s)
Trusted Execution Environment (TEE)
FIDO Authenticator as Trusted Application (TA)
Client Side Biometrics
User Verification / Presence
Attestation Key
Authentication Key(s)
Store at Enrollment
Compare at Authentication
Unlock after comparison
Trusted Execution Environment (TEE)
Using Secure Hardware
FIDO Authenticator as Trusted Application (TA)
User
Verification /
Presence
Secure Display
Secure Element
Attestation Key
Authentication Key(s)
e.g. GlobalPlatform
Trusted UI
Leveraging hardware security
User Space
Secure
Hardware
ASM
UX Layer
Input, Display
Crypto Layer
ASM
UX Layer
Input, Display
Crypto Layer
ASM
Crypto Layer
UX Layer
Input, Display
No Secure HW Secure Crypto
+
Storage
Secure
Execution
Environment
and/or Secure
Elements
FIDO & Federation
FIDO USER DEVICE
FIDO CLIENT
IdP
FIDO SERVER
FIDO
AUTHENTICATOR
FEDERATION SERVERBROWSER / APP UAF Protocol
Service Provider
Federation
Id DB
Knows details about the
Authentication strength
Knows details about the
Identity and its verification
strength.
First Mile Second Mile
How FIDO Addresses Threat Classes
UAF Specifications
FIDO at Industry Event – Readiness
SIM as Secure Element
Fingerprint, TEE, Mobile
Speaker Recognition
Mobile via NFC
PIN + MicroSD
USB
SE Embedded SE
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
OEM Enabled: Lenovo ThinkPads with
Fingerprint Sensors
OEM Enabled: Samsung Galaxy S5 smartphone & Galaxy Tab S
tablets
Clients available for these operating systems:
Software Authenticator Examples:
Speaker/Face recognition, PIN, QR Code, etc.
Aftermarket Hardware Authenticator Examples:
USB fingerprint scanner, MicroSD Secure Element
FIDO READY™ PRODUCTS SHIPPING TODAY
The FIDO Alliance and Nok Nok Labs
Standards Products
Industry
Standard
Protocol
“FIDO Ready™”
FIRST FIDO Ready™
Server and Client Software:
NNL S3 Suite
Key Industry
Partnerships
Call to Action
• FIDO is ready for use – launch a PoC, Pilot
• Get Involved:
o  Develop or adapt your products to FIDO
o  Come to the plenary, meet and mingle, speak with the pioneers,
select your partners
o  Join the Alliance and contribute – we are a volunteer run
organization
o  Contact donal@fidoalliance.org for membership details
o  Other questions – rolf@noknok.com
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
Relying
Party
(example.com)
username, policy,
AppID, challenge
username u, ak; hash(fcp)
a
generate:
key kpub
key kpriv
handle h aaid, kpub, fc, h, attestation cert, reg-cntr, cntr,
signature(aaid,fc,reg-cntr,cntr,kpub)
aaid, kpub, fc, h, attestation cert,
reg-cntr, cntr, s store:
key kpub
handle h
s
UAF Registration
ASM + FIDO Client
+ Browser1stF IAuthnr
select Authenticator according to policy;
check AppID, get tlsData (i.e. channel id, etc.);
generate APIKey random, compute access key
ak := hash(AppID|APIKey|PersonaID|CallerID)
fcp := {a, challenge, facetID, tlsData}
fc
Note: This represents using a FIDO First-Factor Internal
Authenticator -- it makes the differences to U2F more
clear.
1stF IAuthnr
ASM + FIDO Client
+ Browser
Relying
Party
h, ak; hash(fcp)
select Authenticator according to policy;
check AppID, get tlsData (i.e. channel id, etc.);
lookup key handle h and access key ak;
fcp := {a, challenge, facetID, tlsData}
check: ak
retrieve:
key kpriv
from h;
cntr++
generate
Authnr
Nonce n
fc, n, cntr, signature(fc,n,cntr)
fcp, n, cntr, s
lookup kpub
from DB
check:
policy +
signature
using
key kpub
s
UAF Authentication
fc
a
policy, AppID, challenge
Note: NO username+Password login required before this
sequence. Click on FIDO Button (or similar trigger) is sufficient.
Binding Authenticator to User
Login with legacy credential
User A
Cloud
Service
1
Perform FIDO Register function
Authenticator 1
2
User A
Authenticator 1
Case A: Existing User
Binding Authenticator to User
Create new account
User B Cloud
Service
1
Perform FIDO Register function
Authenticator 2
Cloud
Service
2
User B
Authenticator 2
Case B: New User
Opt.: verify
attrs. with
3rd party
www.fidoalliance.org/specifications/download
Thank you

More Related Content

PDF
Fido Overview: Status and Future
PDF
FIDO UAF 1.0 Specs: Overview and Insights
PDF
FIDO alliance #idcon vol.18
PDF
FIDO UAF Specifications: Overview & Tutorial
PDF
FIDO U2F Specifications: Overview & Tutorial
PDF
FIDO U2F & UAF Tutorial
PDF
FIDO Specifications Overview: UAF & U2F
PPTX
FIDOAlliance
Fido Overview: Status and Future
FIDO UAF 1.0 Specs: Overview and Insights
FIDO alliance #idcon vol.18
FIDO UAF Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & Tutorial
FIDO U2F & UAF Tutorial
FIDO Specifications Overview: UAF & U2F
FIDOAlliance

What's hot (20)

PDF
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
PDF
FIDO UAF 1.0 Specs: Overview and Insights
PPTX
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
PDF
FIDO Specifications Tutorial
PDF
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
PDF
FIDO in Government
PPTX
Getting to Know the FIDO Specifications - Technical Tutorial
PPTX
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
PPTX
Fido U2F Protocol by Ather Ali
PDF
Securing a Web App with Passwordless Web Authentication
PDF
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
PPTX
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
PPTX
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
PDF
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
PPTX
FIDO Certification
PPTX
Fido and Touch ID
PDF
FIDO’s fit for Key Industries in Korea
PDF
Identity Tech Talks #3 FIDO futur of authentication
PDF
LINEのFIDO導入と将来展望
PDF
FIDO2 and Microsoft
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
FIDO UAF 1.0 Specs: Overview and Insights
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
FIDO Specifications Tutorial
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
FIDO in Government
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
Fido U2F Protocol by Ather Ali
Securing a Web App with Passwordless Web Authentication
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
FIDO Certification
Fido and Touch ID
FIDO’s fit for Key Industries in Korea
Identity Tech Talks #3 FIDO futur of authentication
LINEのFIDO導入と将来展望
FIDO2 and Microsoft
Ad

Viewers also liked (11)

PDF
CIS14: Building Blocks for Mobile Authentication and Security
PDF
Introducing SAML 2.0 Protocol: Security and Performance
PDF
Dataporten intro (workshop with Difi)
PDF
CIS14: Working with OAuth and OpenID Connect
PDF
OpenID Connect - Nat Sakimura at OpenID TechNight #7
PDF
OAuth 2.0 & OpenID Connect #MA7
PDF
Introduction to FIDO Authentication
PDF
[LDAPCon 2015] The OpenID Connect Protocol
PPTX
OpenID Connect: An Overview
PDF
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
PDF
Introduction to SAML 2.0
CIS14: Building Blocks for Mobile Authentication and Security
Introducing SAML 2.0 Protocol: Security and Performance
Dataporten intro (workshop with Difi)
CIS14: Working with OAuth and OpenID Connect
OpenID Connect - Nat Sakimura at OpenID TechNight #7
OAuth 2.0 & OpenID Connect #MA7
Introduction to FIDO Authentication
[LDAPCon 2015] The OpenID Connect Protocol
OpenID Connect: An Overview
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
Introduction to SAML 2.0
Ad

Similar to CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications (20)

PPTX
FIDO Specifications Overview
PDF
FIDO Authentication Technical Overview
PDF
FIDO Authentication Technical Overview
PPTX
Technical Considerations for Deploying FIDO Authentication
PDF
FIDO Technical Overview at FIDO KWG Hackathon
PDF
FIDO Technical Specifications Overview
PDF
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
PDF
FIDO Technical Specifications Overview
PDF
Mobile Cloud Identity
PPTX
FIDO & Strong Authentication Technology Landscape
PDF
Integrating FIDO Authentication & Federation Protocols
PPTX
FIDO Alliance: Year in Review Webinar slides from January 20 2016
PPTX
Technical Principles of FIDO Authentication
PDF
エンタープライズの視点からFIDOとFederationのビジネスを考える
PDF
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
PDF
Go passwordless with fido2
PDF
Technical Principles of FIDO Authentication
PDF
Technical Principles of FIDO Authentication
PDF
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
PDF
Overview of FIDO Security Requirements and Certifications
FIDO Specifications Overview
FIDO Authentication Technical Overview
FIDO Authentication Technical Overview
Technical Considerations for Deploying FIDO Authentication
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Specifications Overview
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
FIDO Technical Specifications Overview
Mobile Cloud Identity
FIDO & Strong Authentication Technology Landscape
Integrating FIDO Authentication & Federation Protocols
FIDO Alliance: Year in Review Webinar slides from January 20 2016
Technical Principles of FIDO Authentication
エンタープライズの視点からFIDOとFederationのビジネスを考える
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
Go passwordless with fido2
Technical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
Overview of FIDO Security Requirements and Certifications

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Spectroscopy.pptx food analysis technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
1. Introduction to Computer Programming.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Machine learning based COVID-19 study performance prediction
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPT
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
MYSQL Presentation for SQL database connectivity
Spectroscopy.pptx food analysis technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25-Week II
1. Introduction to Computer Programming.pptx
Network Security Unit 5.pdf for BCA BBA.
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Digital-Transformation-Roadmap-for-Companies.pptx
Getting Started with Data Integration: FME Form 101
Group 1 Presentation -Planning and Decision Making .pptx
Teaching material agriculture food technology

CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications