Skip to main content

Table 3. Results for G1\(_{ A }\) (Analyses 2 and 3).

From: Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience

Removed weak Asm(s) Compromised factors Atk
PIN \(\{\) seed \(\}\_\) PIN token \(\_\) IdP
BA1 x \(\checkmark \) \(\checkmark \) No
BA2 \(\checkmark \) x x No
UBA1 \(\checkmark \) x x No
UBA2 x \(\checkmark \) \(\checkmark \) No
(UBA1 \(\vee \) BA2) \(\wedge \) BA1 \(\checkmark \) \(\checkmark \) \(\checkmark \) Yes
(UBA1 \(\vee \) BA2) \(\wedge \) UBA2 \(\checkmark \) \(\checkmark \) \(\checkmark \) Yes