1 Hit in 7.2 sec

Two-Factor Authentication with End-to-End Password Security [chapter]

Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2018 Lecture Notes in Computer Science  
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device.  ...  ' passwords, and perform active and passive attacks, online and oine.  ...  In Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pages 277295, 2008. 47. N. Saxena, J.-E. Ekberg, K.  ... 
doi:10.1007/978-3-319-76581-5_15 fatcat:45ip4zwpqjb7vjrpbz2aiwmpmy