共 50 条
- [1] Weak authentication (Transcript of Discussion) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 2845 : 18 - 19
- [2] User Authentication for the Internet of Things (Transcript of Discussion) SECURITY PROTOCOLS XXVI, 2018, 11286 : 214 - 224
- [3] Lightweight authentication in a mobile network - (Transcript of discussion) SECURITY PROTOCOLS, 2002, 2467 : 217 - 220
- [4] Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords SECURITY PROTOCOLS XIX, 2011, 7114 : 98 - 104
- [5] SMAPs: Short Message Authentication Protocols (Transcript of Discussion) SECURITY PROTOCOLS XXIV, 2017, 10368 : 133 - 140
- [6] Better Authentication Password Revolution by Evolution (Transcript of Discussion) SECURITY PROTOCOLS XXII, 2014, 8809 : 146 - 153
- [7] Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion) SECURITY PROTOCOLS XXVI, 2018, 11286 : 15 - 23
- [8] Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion) SECURITY PROTOCOLS XXII, 2014, 8809 : 216 - 220
- [9] Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion) SECURITY PROTOCOLS XIX, 2011, 7114 : 33 - 48