Login / Signup
Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy.
Aleck Nash
Hudan Studiawan
George Grispos
Kim-Kwang Raymond Choo
Published in:
ICDF2C (2) (2023)
Keyphrases
</>
security analysis
authentication protocol
public key
smart card
high security
security requirements
user authentication
security properties
mutual authentication
image encryption
encryption scheme
authentication scheme
lightweight