Login / Signup

Sound-based Two-factor Authentication: Vulnerabilities and Redesign.

Prakash ShresthaAhmed Tanvir MahdadNitesh Saxena
Published in: ACM Trans. Priv. Secur. (2024)
Keyphrases
  • factor authentication
  • business process
  • information security
  • smart card
  • security mechanisms
  • mobile terminals
  • low cost
  • network security
  • resource constrained
  • trusted computing