Mobile Authentication Secure against Man-in-the-Middle Attacks
暂无分享,去创建一个
[1] Bruce Schneier,et al. Two-factor authentication: too little, too late , 2005, CACM.
[2] Audun Jøsang,et al. An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems , 2008, AISC.
[3] Moti Yung,et al. Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens , 2012, ACNS.
[4] Lorrie Faith Cranor,et al. A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.
[5] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[6] Dan Boneh,et al. Transaction Generators: Root Kits for Web , 2007, HotSec.