Login / Signup

Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems.

Matthew M. TolbertElie M. HessMattheus C. NascimentoYunsen LeiCraig A. Shue
Published in: ICICS (2022)
Keyphrases
  • neural network
  • authentication protocol
  • expert systems
  • management system
  • computer systems
  • complex systems
  • information security
  • biometric authentication