How to Attack Two-Factor Authentication Internet Banking.
Manal T. AdhamAmir AzodiYvo DesmedtIoannis KaraolisPublished in: Financial Cryptography (2013)
Keyphrases
- internet banking
- factor authentication
- security analysis
- hong kong
- smart card
- security threats
- customer satisfaction
- data envelopment analysis
- authentication protocol
- secret key
- fraud detection
- public key
- security issues
- perceived risk
- social context
- critical infrastructure
- security requirements
- trusted computing
- user satisfaction