共 50 条
- [1] On the Security of a Two-Factor Authentication Scheme [J]. INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +
- [2] On the (In)Security of Mobile Two-Factor Authentication [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 365 - 383
- [3] Cryptocurrencies with Security Policies and Two-Factor Authentication [J]. 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 140 - 158
- [5] Two-Factor Authentication with End-to-End Password Security [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
- [8] TWO-FACTOR AUTHENTICATION SYSTEM [J]. INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 505 - 512
- [9] On the Usability of Two-Factor Authentication [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
- [10] Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks' [J]. ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 55 - 60