A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Two-Factor Authentication with End-to-End Password Security
[chapter]
2018
Lecture Notes in Computer Science
We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device. ...
' passwords, and perform active and passive attacks, online and oine. ...
In Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pages 277295, 2008. 47. N. Saxena, J.-E. Ekberg, K. ...
doi:10.1007/978-3-319-76581-5_15
fatcat:45ip4zwpqjb7vjrpbz2aiwmpmy