Login / Signup
Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks.
Wenhao Wang
Guyue Li
Zhiming Chu
Haobo Li
Daniele Faccio
Published in:
CoRR (2023)
Keyphrases
</>
behavior patterns
factor authentication
behavior analysis
behavioral patterns
security protocols
mobile terminals
computer security
trusted computing
smart card
computer networks