Publisher
Springer Science and Business Media LLC
Reference56 articles.
1. Amin A, Haq I, Nazir M (2017) Two factor authentication. Int J Comput Sci Mob Comput 6(7):5–8
2. Barnes R, Thomson M, Pironti A, Langley A (2015) Deprecating secure sockets layer version 3.0. https://tools.ietf.org/html/rfc7568. Accessed 29 May 2020
3. Barman S, Shum HPH, Chattopadhyay S, Samanta D (2019) A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme. IEEE Access https://ieeexplore.ieee.org/document/8620682. Accessed 30 Nov 2019
4. Burrows M, Abadi M, Needham R (1989) A logic of authentication. ACM SIGOPS Oper Syst Rev 23(5):1–13
5. Capital One (2018) Bank securely. https://www.capitalone.com/applications/identity-protection/commitment/. Accessed 10 June 2018
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献