Login / Signup
TAES: Two-factor Authentication with End-to-End Security against VoIP Phishing.
Dai Hou
Hao Han
Ed Novak
Published in:
SEC (2020)
Keyphrases
</>
end to end
factor authentication
smart card
authentication systems
trusted computing
congestion control
mobile terminals
ad hoc networks
security requirements
ip networks
biometric authentication
real time
security mechanisms
application layer
security issues
network management
access control
e government