共 50 条
- [1] Factorizing 2FA: Forensic analysis of two-factor authentication applications [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 45
- [2] Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 109 - 126
- [3] A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4938 - 4949
- [4] Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing [J]. IEEE ACCESS, 2020, 8 (08): : 28956 - 28969
- [8] Two-factor authentication for the Bitcoin protocol [J]. International Journal of Information Security, 2017, 16 : 213 - 226
- [9] Two-Factor Authentication for the Bitcoin Protocol [J]. SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 155 - 171