Login / Signup
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.
Mohammad Mannan
Paul C. van Oorschot
Published in:
Financial Cryptography (2007)
Keyphrases
</>
password authentication
third party
computer systems
personal information
key exchange protocol
privacy preserving
smart card
security policies
authentication protocol