Login / Signup
Strengthening Password-based Authentication.
Scott Ruoti
Jeff Andersen
Kent E. Seamons
Published in:
WAY@SOUPS (2016)
Keyphrases
</>
user authentication
authentication protocol
security analysis
authentication scheme
key agreement
biometric authentication
keystroke dynamics
information security
key exchange protocol
elliptic curve
smart card
biometric systems
key exchange
secret key
mutual authentication
public key
cloud computing
digital images