Research Article
Secure OpenID Authentication Model by Using Trusted Computing
Table 1
Comparative analysis.
| Title | Insider attack | MITM | Phishing attacks | DNS poisoning |
| [68] | | | * | * | [17] | | | * | * | [58] | | * | * | | [69] | | | * | | [70] | | * | * | | [71] | | * | | | [72] | | * | * | | [27] | * | | * | | [73] | | | * | | [60] | * | | | | [74] | | | * | * | Secured OpenID model (our proposed model) | * | * | * | * |
|
|