Author:
Gupta Chandranshu,Varshney Gaurav
Publisher
Springer Nature Switzerland
Reference30 articles.
1. Bian, W., Gope, P., Cheng, Y., Li, Q.: Bio-aka: An efficient fingerprint based two factor user authentication and key agreement scheme. Futur. Gener. Comput. Syst. 109, 45–55 (2020)
2. Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: The Ninth Workshop on the Economics of Information Security (WEIS) (2010)
3. Dauterman, E., Corrigan-Gibbs, H., Mazières, D., Boneh, D., Rizzo, D.: True2f: backdoor-resistant authentication tokens. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 398–416. IEEE (2019)
4. Lecture Notes in Computer Science;L Davi,2011
5. DUO: Two-factor authentication (2fa). https://duo.com/product/multi-factor-authentication-mfa/two-factor-authentication-2fa. Accessed 08 May 2024