共 50 条
- [32] On the Usability of Two-Factor Authentication INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
- [34] A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4938 - 4949
- [35] A Two-Factor Authentication Scheme based on Negative Databases 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 1110 - 1115
- [36] Improved Mobile Security Based on Two-Factor Authentication SECURITY AND PRIVACY, 2025, 8 (01):
- [37] Hardware-Accelerated Blockchain-Based Authentication for the Internet of Things COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 : 283 - 295
- [40] An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks Peer-to-Peer Networking and Applications, 2015, 8 : 1070 - 1081