Login / Signup
Excavating Vulnerabilities Lurking in Multi-Factor Authentication Protocols: A Systematic Security Analysis.
Ang Kok Wee
Eyasu Getahun Chekole
Jianying Zhou
Published in:
CoRR (2024)
Keyphrases
</>
security analysis
authentication protocol
smart card
public key
security requirements
information security
user authentication
security mechanisms
security properties
authentication scheme
encryption scheme
private key
key exchange
key distribution
low cost
security issues