Sign in

Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.

Antonio BianchiEric GustafsonYanick FratantonioChristopher KruegelGiovanni Vigna
Published in: ACSAC (2017)
Keyphrases
  • information sources
  • contextual information
  • neural network
  • computer systems
  • information content
  • information systems
  • website
  • higher level
  • information sharing
  • temporal information