Two-Factor Authentication with End-to-End Password Security.
Stanislaw JareckiHugo KrawczykMaliheh ShirvanianNitesh SaxenaPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- end to end
- factor authentication
- authentication systems
- biometric recognition
- user authentication
- information security
- biometric authentication
- congestion control
- biometric systems
- face recognition
- ad hoc networks
- multimodal biometrics
- application layer
- mobile terminals
- smart card
- trusted computing
- intrusion detection
- network security