Login / Signup

Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.

Mohammad MannanPaul C. van Oorschot
Published in: Financial Cryptography (2007)
Keyphrases
  • password authentication
  • third party
  • computer systems
  • personal information
  • key exchange protocol
  • privacy preserving
  • smart card
  • security policies
  • authentication protocol