Login / Signup
Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems.
Matthew M. Tolbert
Elie M. Hess
Mattheus C. Nascimento
Yunsen Lei
Craig A. Shue
Published in:
ICICS (2022)
Keyphrases
</>
neural network
authentication protocol
expert systems
management system
computer systems
complex systems
information security
biometric authentication