Login / Signup
Passphone: Outsourcing Phone-Based Web Authentication While Protecting User Privacy.
Martin Potthast
Christian Forler
Eik List
Stefan Lucks
Published in:
NordSec (2016)
Keyphrases
</>
user privacy
identity management
access control
privacy preservation
privacy preserving
user centric
database
mobile phone
databases
private information
data sets
end users
information sources
high dimensional data
personal information
malicious users