https://pomcor.com https://pomcor.com/blog/ https://pomcor.com/developers/ https://pomcor.com/pjcl/ https://pomcor.com/pjcl/pjcl-documentation.pdf https://pomcor.com/cryptographic-authentication/ https://pomcor.com/research/ https://pomcor.com/cardholder-authentication/ https://pomcor.com/remote-identity-proofing/ https://pomcor.com/javascript-cryptography/ https://pomcor.com/cryptographic-modules/ https://pomcor.com/derived-credentials/ https://pomcor.com/archived-research-pages/ https://pomcor.com/mobile-authentication/ https://pomcor.com/internet-identity/ https://pomcor.com/search-technology/ https://pomcor.com/web-security/ https://pomcor.com/patents/ https://pomcor.com/streamlined-process-for-licensing-us-patent-9887989-to-a-particular-web-site/ https://pomcor.com/company/ https://pomcor.com/nsf-funding/ https://pomcor.com/connect-springboard-mentoring/ https://pomcor.com/contact-us/ https://pomcor.com/archive/ https://pomcor.com/demos/ https://pomcor.com/tls-traffic-visibility/ https://pomcor.com/2023/10/27/overview-of-iso-iec-18013-5-innovations-and-vulnerabilities-in-the-mdl-standard/ https://pomcor.com/2023/09/22/a-streamlined-process-for-licensing-a-cryptographic-authentication-patent/ https://pomcor.com/2023/08/09/a-demonstration-of-two-factor-cryptographic-authentication-with-a-familiar-user-experience/ https://pomcor.com/2023/06/06/a-brief-overview-of-cryptographic-authentication-with-a-discussion-of-three-hot-topics/ https://pomcor.com/2023/03/09/fido2-and-webauthn-have-momentum-but-wont-help-if-they-are-not-used/ https://pomcor.com/2022/12/30/overcoming-the-ux-challenges-faced-by-fido-credentials-in-the-consumer-space/ https://pomcor.com/2022/08/01/a-user-experience-for-strong-authentication-in-the-consumer-space/ https://pomcor.com/2022/07/27/strong-authentication-for-the-consumer-space/ https://pomcor.com/2022/07/22/comparative-security-analysis-of-three-cryptographic-authentication-solutions-for-the-web/ https://pomcor.com/2022/07/19/passwordless-authentication-for-the-consumer-space/ https://pomcor.com/2022/07/18/pomcor-releases-pjcl-on-github-and-npm/ https://pomcor.com/2022/04/26/identity-in-a-zero-trust-architecture/ https://pomcor.com/2022/04/26/ken-cone-joins-pomcor-as-cfo/ https://pomcor.com/2021/06/28/pomcor-granted-patent-on-frictionless-cardholder-authentication/ https://pomcor.com/2021/03/15/the-0-rtt-feature-of-tls-1-3-can-be-used-as-an-encrypted-steganographic-channel-to-operate-a-backdoor-into-an-enterprise-network/ https://pomcor.com/2021/02/03/nubeva-explains-how-it-handles-tls-1-3-key-updates-in-response-to-pomcor-blog-post/ https://pomcor.com/2021/01/21/a-survey-of-existing-and-proposed-tls-visibility-solutions/ https://pomcor.com/2021/01/08/a-two-version-visibility-solution-for-tls-1-2-and-tls-1-3-based-on-a-handshake-agnostic-middlebox/ https://pomcor.com/2020/11/17/extending-the-tls-1-3-visibility-solution-to-include-psk-and-0-rtt/ https://pomcor.com/2020/10/26/protocol-level-details-of-the-tls-1-3-visibility-solution/ https://pomcor.com/2020/09/25/reconciling-forward-secrecy-with-network-traffic-visibility-in-enterprise-deployments-of-tls-1-3/ https://pomcor.com/2020/09/12/pomcor-granted-patent-on-how-to-implement-a-pki-on-a-blockchain/ https://pomcor.com/2020/07/21/request-for-comments-a-possible-worlds-semantics-for-kolmogorovs-axiomatization-of-probability-theory/ https://pomcor.com/2020/06/15/airport-security-in-the-age-of-covid-19/ https://pomcor.com/2020/05/11/in-loving-memory-of-karen-lewison/ https://pomcor.com/2020/03/30/identity-verification-a-coronavirus-challenge-to-the-financial-world/ https://pomcor.com/2020/02/21/pomcor-granted-patent-on-rich-credentials/ https://pomcor.com/2019/11/20/a-new-tool-against-the-surge-of-application-fraud/ https://pomcor.com/2019/11/19/psd2-is-in-trouble-will-it-survive/ https://pomcor.com/2019/10/28/will-cardholder-authentication-ever-come-to-the-us/ https://pomcor.com/2019/10/15/3-d-secure-2-may-allow-the-merchant-to-impersonate-the-cardholder/ https://pomcor.com/2019/06/23/online-cardholder-authentication-without-accessing-the-card-issuers-site/ https://pomcor.com/2019/03/28/a-formal-proof-of-omission-tolerant-integrity-protection/ https://pomcor.com/2019/03/17/mapping-a-formal-definition-of-collision-resistance-to-existing-implementations-of-hash-functions/ https://pomcor.com/2019/03/04/using-an-omission-tolerant-checksum-for-selective-disclosure-of-attributes-asserted-by-a-public-key-certificate/ https://pomcor.com/2019/02/28/an-omission-tolerant-cryptographic-checksum/ https://pomcor.com/2019/01/01/pomcor-contributes-biometrics-chapter-to-hci-and-cybersecurity-handbook/ https://pomcor.com/2018/09/28/new-conference-to-address-the-human-aspects-of-cybersecurity-and-cryptography/ https://pomcor.com/2018/08/06/frictionless-secure-web-payments-without-giving-up-on-cardholder-authentication/ https://pomcor.com/2018/07/04/random-bit-generation-with-full-entropy-and-configurable-prediction-resistance-in-a-node-js-application/ https://pomcor.com/2018/06/25/login-session-maintenance-in-node-js-using-express-and-handlebars/ https://pomcor.com/2018/06/18/credential-registration-for-cryptographic-authentication-with-node-js-and-mongodb/ https://pomcor.com/2018/06/12/cryptographic-authentication-with-node-js-and-mongodb/ https://pomcor.com/2018/05/16/a-bypass-of-the-firefox-post-redirection-bug/ https://pomcor.com/2018/05/11/cryptographic-authentication-is-not-that-easy-after-all/ https://pomcor.com/2018/04/28/pomcor-granted-patent-on-multifactor-cryptographic-authentication/ https://pomcor.com/2018/04/13/easy-password-free-cryptographic-authentication-for-web-applications/ https://pomcor.com/2018/04/03/pjcl-can-now-be-used-in-node-js-server-side-code-exactly-as-in-the-browser/ https://pomcor.com/2018/03/25/second-release-of-pjcl-expands-functionality-following-nist-cryptographic-specifications/ https://pomcor.com/2018/01/09/pomcor-releases-javascript-cryptographic-and-big-integer-library/ https://pomcor.com/2017/06/02/keys-in-browser/ https://pomcor.com/2017/04/22/what-kind-of-encrypted-fingerprint-template-is-used-by-mastercard/ https://pomcor.com/2017/03/30/comments-on-the-recommended-use-of-biometrics-in-the-new-digital-identity-guidelines-nist-sp-800-63-3/ https://pomcor.com/2016/10/30/using-near-field-communication-for-remote-identity-proofing/ https://pomcor.com/2016/10/28/remote-identity-proofing-discussed-at-the-internet-identity-workshop/ https://pomcor.com/2016/10/25/implementing-a-pki-on-a-blockchain/ https://pomcor.com/2016/10/18/rich-credentials-for-three-factor-identity-verification-without-prior-relationship/ https://pomcor.com/2016/08/03/pomcor-receives-dhs-grant-to-look-for-alternatives-to-knowledge-based-verification-for-remote-identity-proofing/ https://pomcor.com/2016/05/02/revocable-biometrics-discussion-at-the-internet-identity-workshop/ https://pomcor.com/2016/02/09/nsas-faqs-demystify-the-demise-of-suite-b-but-fail-to-explain-one-important-detail/ https://pomcor.com/2015/11/12/cryptographic-module-standards-at-a-crossroads-after-snowdens-revelations/ https://pomcor.com/2015/10/25/faster-modular-exponentiation-in-javascript/ https://pomcor.com/2015/06/03/has-bluetooth-become-secure/ https://pomcor.com/2015/05/13/nist-looks-at-emv-to-speed-up-physical-access-with-piv-contactless-cards/ https://pomcor.com/2015/03/24/highlights-of-the-nist-worshop-on-piv-related-special-publications/ https://pomcor.com/2015/03/01/biometrics-and-derived-credentials/ https://pomcor.com/2015/02/26/biometrics-in-piv-cards/ https://pomcor.com/2015/02/11/nist-omits-encryption-requirement-for-derived-credentials/ https://pomcor.com/2015/01/30/nist-fails-to-address-concerns-on-derived-credentials/ https://pomcor.com/2014/11/12/virtual-tamper-resistance-is-the-answer-to-the-hce-conundrum/ https://pomcor.com/2014/11/09/how-apple-pay-uses-3-d-secure-for-internet-payments/ https://pomcor.com/2014/10/19/making-sense-of-the-emv-tokenisation-specification/ https://pomcor.com/2014/10/06/implementing-virtual-tamper-resistance-without-a-secure-channel/ https://pomcor.com/2014/10/05/which-flavor-of-tokenization-is-used-by-apple-pay/ https://pomcor.com/2014/09/25/smart-cards-tees-and-derived-credentials/ https://pomcor.com/2014/09/20/apple-pay-must-be-using-the-mag-stripe-mode-of-the-emv-contactless-specifications/ https://pomcor.com/2014/09/14/security-weaknesses-of-apple-pay-for-in-store-transactions/ https://pomcor.com/2014/09/14/apple-pay-emv-and-tokenization/ https://pomcor.com/2014/09/10/on-the-security-of-apple-pay/ https://pomcor.com/2014/08/02/forthcoming-presentation-at-the-globalplatform-tee-conference/ https://pomcor.com/2014/08/02/identity-based-protocol-design-patterns-for-machine-to-machine-secure-channels/ https://pomcor.com/2014/08/02/invited-talk-at-the-university-of-utah/ https://pomcor.com/2014/04/21/patent-illustrates-five-different-problems-with-software-patents/ https://pomcor.com/2014/04/10/derived-credentials-in-a-trusted-execution-environment-tee/ https://pomcor.com/2014/04/01/protecting-derived-credentials-without-secure-hardware-in-mobile-devices/ https://pomcor.com/2013/11/19/its-time-to-redesign-transport-layer-security/ https://pomcor.com/2013/10/28/surveillance-and-internet-identity/ https://pomcor.com/2013/06/09/pomcor-granted-patent-on-method-of-browsing-real-time-search-results/ https://pomcor.com/2013/05/15/feedback-on-the-paper-on-privacy-postures-of-authentication-technologies/ https://pomcor.com/2013/05/05/comparing-the-privacy-features-of-eighteen-authentication-technologies/ https://pomcor.com/2013/04/20/two-methods-of-cryptographic-single-sign-on-on-mobile-devices/ https://pomcor.com/2013/04/16/using-cryptographic-authentication-without-a-cryptographic-api-on-ios-and-android-devices/ https://pomcor.com/2013/04/12/strong-authentication-with-a-low-entropy-biometric-key/ https://pomcor.com/2013/04/08/defense-in-depth-of-cryptographic-credentials-on-a-mobile-device/ https://pomcor.com/2013/04/03/closed-loop-vs-open-loop-authentication/ https://pomcor.com/2013/03/29/new-research-on-mobile-authentication/ https://pomcor.com/2012/10/07/consistent-results-from-inconsistent-data/ https://pomcor.com/2012/09/25/report-on-the-nist-cryptographic-key-management-workshop/ https://pomcor.com/2012/09/23/effective-data-protection-for-mobile-devices/ https://pomcor.com/2012/08/22/techniques-for-implementing-derived-credentials-on-mobile-devices/ https://pomcor.com/2012/07/30/convenient-one-two-and-three-factor-authentication-for-mobile-devices/ https://pomcor.com/2012/06/25/a-protocol-for-social-login-in-the-age-of-mobile/ https://pomcor.com/2012/05/27/nstic-is-not-low-hanging-fruit/ https://pomcor.com/2012/02/13/one-click-openid-a-solution-to-the-nascar-problem/ https://pomcor.com/2012/02/10/openid-providers-invited-to-join-in-an-nstic-pilot-proposal/ https://pomcor.com/2012/01/23/after-cardspace-microsoft-calls-for-research-on-passwords/ https://pomcor.com/2011/12/19/credential-sharing-a-pitfall-of-anonymous-credentials/ https://pomcor.com/2011/12/12/trip-report-meeting-on-privacy-enhancing-cryptography-at-nist/ https://pomcor.com/2011/11/06/do-not-track-and-third-party-login/ https://pomcor.com/2011/10/24/benefits-of-tls-for-issuing-and-presenting-cryptographic-credentials/ https://pomcor.com/2011/10/16/deployment-and-usability-of-cryptographic-credentials/ https://pomcor.com/2011/10/13/are-privacy-enhancing-technologies-really-needed-for-nstic/ https://pomcor.com/2011/10/10/pros-and-cons-of-idemix-for-nstic/ https://pomcor.com/2011/10/04/pros-and-cons-of-u-prove-for-nstic/ https://pomcor.com/2011/07/31/pomcors-comments-on-the-cybersecurity-green-paper/ https://pomcor.com/2011/07/22/pomcors-response-to-the-nstic-notice-of-inquiry/ https://pomcor.com/2011/07/18/browserid-and-nstic/ https://pomcor.com/2011/07/17/a-proposed-architecture-for-the-nstic-ecosystem/ https://pomcor.com/2011/05/31/altly-needs-pkauth/ https://pomcor.com/2011/05/09/must-site-know-application-in-social-login/ https://pomcor.com/2011/04/26/browsing-real-time-search-results/ https://pomcor.com/2011/04/10/thoughts-about-nstic-after-nist-idtrust-workshop/ https://pomcor.com/2011/04/05/pkauth-social-login/ https://pomcor.com/2011/03/07/welcome-to-the-pomcor-blog/ https://pomcor.com/documents/Chapter2.pdf https://pomcor.com/documents/Chapter14.pdf https://pomcor.com/documents/Chapter13.pdf https://pomcor.com/techreports/hcii2023-preprint.pdf https://pomcor.com/techreports/security-flaws-in-3ds2.pdf https://pomcor.com/techreports/otcc.pdf https://pomcor.com/techreports/frictionless-cardholder-authentication.pdf https://pomcor.com/documents/frictionless-cardholder-authentication.ppt https://pomcor.com/documents/CryptoAuthSJSU20180405.pdf https://pomcor.com/documents/KeysInBrowser.pdf https://pomcor.com/techreports/NFCforRemoteIDProofing.pdf https://pomcor.com/documents/IIW23.pdf https://pomcor.com/techreports/BlockchainPKI.pdf https://pomcor.com/documents/FiveProofingTechniques.pdf https://pomcor.com/techreports/RichCredentials.pdf https://pomcor.com/documents/RevocableBiometrics.pdf https://pomcor.com/documents/ICMC2015.pdf https://pomcor.com/documents/ModExpInJS.pdf https://pomcor.com/whitepapers/EMVTok.pdf https://pomcor.com/documents/VirtualTamperResistanceForATEE.pptx https://pomcor.com/techreports/M2MSec14.pdf https://pomcor.com/documents/UtahSlides20140529.pptx https://pomcor.com/documents/CommentsOnPriorArtCrowdsourcing.txt https://pomcor.com/documents/PriorArtReUS8625805.pdf https://pomcor.com/documents/CommentsOnDerivedCredentials.txt https://pomcor.com/techreports/DerivedCredentialsExample.pdf https://pomcor.com/whitepapers/TimeToRedesignTLS.pdf https://pomcor.com/techreports/PrivacyPostures.pdf https://pomcor.com/documents/PrivacyPosturesPresentation.pdf https://pomcor.com/whitepapers/CryptographicAuthentication.pdf https://pomcor.com/whitepapers/DerivedCredentials.pdf https://pomcor.com/whitepapers/DataProtection.pdf https://pomcor.com/documents/NewAuthMethod.pdf https://pomcor.com/whitepapers/MobileAuthentication.pdf https://pomcor.com/whitepapers/SAAAM.pdf https://pomcor.com/documents/UnfundedNSFSaTCProposal.pdf https://pomcor.com/documents/PomcorCybersecurityComments.pdf https://pomcor.com/documents/PomcorNOIResponse.pdf https://pomcor.com/whitepapers/ProposedNSTICArchitecture.pdf https://pomcor.com/whitepapers/NSTICPrivacySocialLogin.pdf https://pomcor.com/whitepapers/NSTICWhitePaper.pdf https://pomcor.com/whitepapers/PKAuth.pdf https://pomcor.com/techreports/DoubleRedirection.pdf https://pomcor.com/techreports/cooperative_responses_algorithm.pdf https://pomcor.com/whitepapers/cooperative_responses.pdf https://pomcor.com/whitepapers/retaining_queries.pdf https://pomcor.com/whitepapers/multiple_queries.pdf https://pomcor.com/whitepapers/file_sharing_security.pdf https://pomcor.com/whitepapers/secure_password_reset.pdf https://pomcor.com/whitepapers/protecting_against_password_guessing_attacks.pdf