Multi-factor authentication using threshold cryptography
暂无分享,去创建一个
[1] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[2] Maurice Mignotte,et al. How to Share a Secret? , 1982, EUROCRYPT.
[3] Lein Harn,et al. Group Authentication , 2013, IEEE Transactions on Computers.
[4] Donald E. Eastlake,et al. Randomness Requirements for Security , 2005, RFC.
[5] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[6] Christian Callegari,et al. Advances in Computing, Communications and Informatics (ICACCI) , 2015 .
[7] Ahmad-Reza Sadeghi,et al. Security Analysis of Mobile Two-Factor Authentication Schemes , 2014 .
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[10] Dr. Talal Alkharobi. Secret sharing , 2022 .
[11] Prabhat Kumar,et al. A Comprehensive Study on Multifactor Authentication Schemes , 2012, ACITY.