Login / Signup
T/Key: Second-Factor Authentication From Secure Hash Chains.
Dmitry Kogan
Nathan Manohar
Dan Boneh
Published in:
CoRR (2017)
Keyphrases
</>
factor authentication
mobile terminals
private key
hash functions
public key
security mechanisms
image encryption
high security