共 50 条
- [32] "It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University PROCEEDINGS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2018), 2018,
- [34] Impact Assessment of Password Reset PRMitM Attack with Two-Factor Authentication JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2297 - 2306
- [35] Two-factor identity authentication scheme based on blockchain and fuzzy extractor Soft Computing, 2023, 27 : 1091 - 1103
- [36] Impact Assessment of Password Reset PRMitM attack with Two-factor Authentication 2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 90 - 97
- [37] The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 475 - 486
- [38] BlinKey: A Two-Factor User Authentication Method for Virtual Reality Devices PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (04):