共 50 条
- [2] On the (In)Security of Mobile Two-Factor Authentication [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 365 - 383
- [3] On the Usability of Two-Factor Authentication [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
- [4] Two-Factor Authentication with End-to-End Password Security [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
- [5] Two-factor authentication schemes based smart card and password with user anonymity [J]. Journal of Computational Information Systems, 2013, 9 (21): : 8831 - 8838
- [7] Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 712 - 723
- [8] MOBILE-BASED CONTINUOUS USER AUTHENTICATION SYSTEM FOR CLOUD SECURITY [J]. PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 176 - 179
- [10] On the Security of a Two-Factor Authentication Scheme [J]. INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +