Security Revisited: Honeytokens meet Google Authenticator.
Vassilis PapaspirouMaria PapathanasakiLeandros A. MaglarasIoanna KantzavelouChristos DouligerisMohamed Amine FerragHelge JanickePublished in: SEEDA-CECNSM (2022)
Keyphrases
- information security
- authentication protocol
- access control
- network security
- security issues
- search engine
- security threats
- computer security
- security management
- website
- security policies
- web pages
- security systems
- security problems
- security level
- information systems
- security analysis
- key management
- security requirements
- network management
- sensitive data
- statistical databases
- smart card
- intrusion detection
- security measures
- information assurance