Login / Signup
Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild.
Ejin Kim
Hyoung-Kee Choi
Published in:
Secur. Commun. Networks (2021)
Keyphrases
</>
security analysis
user authentication
authentication scheme
smart card
high security
security requirements
public key
encryption scheme
biometric authentication
authentication protocol
real time