Login / Signup
A Usability Study of Five Two-Factor Authentication Methods.
Ken Reese
Trevor Smith
Jonathan Dutson
Jonathan Armknecht
Jacob Cameron
Kent E. Seamons
Published in:
SOUPS @ USENIX Security Symposium (2019)
Keyphrases
</>
face recognition