Login / Signup
Sound-based Two-factor Authentication: Vulnerabilities and Redesign.
Prakash Shrestha
Ahmed Tanvir Mahdad
Nitesh Saxena
Published in:
ACM Trans. Priv. Secur. (2024)
Keyphrases
</>
factor authentication
business process
information security
smart card
security mechanisms
mobile terminals
low cost
network security
resource constrained
trusted computing