Login / Signup
T/Key: Second-Factor Authentication From Secure Hash Chains.
Dmitry Kogan
Nathan Manohar
Dan Boneh
Published in:
CCS (2017)
Keyphrases
</>
factor authentication
mobile terminals
security requirements
distributed systems
smart card
quality assessment
trusted computing
high security