Research Article

Secure OpenID Authentication Model by Using Trusted Computing

Table 1

Comparative analysis.

TitleInsider attackMITMPhishing attacksDNS poisoning

[68]**
[17]**
[58]**
[69]*
[70]**
[71]*
[72]**
[27]**
[73]*
[60]*
[74]**
Secured OpenID model (our proposed model)****