• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks.

Wenhao WangGuyue LiZhiming ChuHaobo LiDaniele Faccio
Published in: CoRR (2023)
Keyphrases
  • behavior patterns
  • factor authentication
  • behavior analysis
  • behavioral patterns
  • security protocols
  • mobile terminals
  • computer security
  • trusted computing
  • smart card
  • computer networks