Two-Factor Authentication with End-to-End Password Security.
Stanislaw JareckiHugo KrawczykMaliheh ShirvanianNitesh SaxenaPublished in: Public Key Cryptography (2) (2018)
Keyphrases
- end to end
- factor authentication
- authentication systems
- biometric recognition
- user authentication
- biometric authentication
- information security
- biometric systems
- multimodal biometrics
- trusted computing
- congestion control
- mobile terminals
- smart card
- face recognition
- application layer
- real time
- ad hoc networks
- security analysis
- high security
- intrusion detection
- sensor networks