Login / Signup
Off-Path Hacking: The Illusion of Challenge-Response Authentication.
Yossi Gilad
Amir Herzberg
Haya Shulman
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
computer generated
security analysis
biometric authentication
website
database
shortest path
security mechanisms
security threats
social networks
case study
visual perception
identity management
identity authentication