Sign in
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Dong Wang
Xiaosong Zhang
Jiang Ming
Ting Chen
Chao Wang
Weina Niu
Published in:
Wirel. Commun. Mob. Comput. (2018)
Keyphrases
</>
information security
user authentication
authentication mechanism
security mechanisms
intrusion detection
security requirements
management system
access control
cloud computing
computer security
security systems
security problems