Login / Signup
Leveraging personal devices for stronger password authentication from untrusted computers.
Mohammad Mannan
Paul C. van Oorschot
Published in:
J. Comput. Secur. (2011)
Keyphrases
</>
password authentication
third party
key exchange protocol
personal digital assistants
mobile devices
computer systems
personal information
personal computer
desktop computers
smart card
privacy preserving
authentication protocol
embedded systems
low cost