共 50 条
- [31] Cryptocurrencies with Security Policies and Two-Factor Authentication 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 140 - 158
- [32] Improved Two-Factor Authentication Protocol Based on Biometric Feature and Password for Cloud Service CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 90 - 100
- [34] Robust Two-factor Smart Card Authentication 2017 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2017, : 184 - 188
- [35] BeamAuth: Two-Factor Web Authentication with a Bookmark CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 48 - 57
- [36] Survey on Usable and Secure Two-Factor Authentication 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 842 - 846
- [37] A Usable and Secure Two-Factor Authentication Scheme INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 169 - 182
- [38] Pseudo Code of Two-factor Authentication for BYOD PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT 2017), 2017,
- [39] A novel Two-Factor HoneyToken Authentication Mechanism 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
- [40] Modeling and Analysis of Two-factor Authentication Protocol for USB Digital Evidence Acquisition Devices PROCEEDINGS OF THE 2015 12TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2015, : 241 - 246