Login / Signup
How many FIDO protocols are needed? Surveying the design, security and market perspectives.
Anna Angelogianni
Ilias Politis
Christos Xenakis
Published in:
CoRR (2021)
Keyphrases
</>
functional requirements
user interface
case study
design process
software architecture
information systems
security policies
security mechanisms
security protocols