Login / Signup

Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild.

Ejin KimHyoung-Kee Choi
Published in: Secur. Commun. Networks (2021)
Keyphrases
  • security analysis
  • user authentication
  • authentication scheme
  • smart card
  • high security
  • security requirements
  • public key
  • encryption scheme
  • biometric authentication
  • authentication protocol
  • real time