Login / Signup
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.
Mohammed Jubur
Prakash Shrestha
Nitesh Saxena
Jay Prakash
Published in:
AsiaCCS (2021)
Keyphrases
</>
case study
social networks
human interaction
database
information retrieval
artificial intelligence
human subjects
factor analysis
security analysis