Sign in

T/Key: Second-Factor Authentication From Secure Hash Chains.

Dmitry KoganNathan ManoharDan Boneh
Published in: CCS (2017)
Keyphrases
  • factor authentication
  • mobile terminals
  • security requirements
  • distributed systems
  • smart card
  • quality assessment
  • trusted computing
  • high security