×
Finally, we conduct a large-scale comparative evaluation of 26 representative two-factor schemes, and our results outline the request for better measurement ...
May 30, 2016 · Despite over two decades of continuous efforts, how to design a secure and efficient two-factor authentication scheme remains an open issue.
ABSTRACT. Despite over two decades of continuous efforts, how to de- sign a secure and efficient two-factor authentication scheme remains an open issue.
Finally, we conduct a large-scale comparative evaluation of 26 representative two- factor schemes, and our results outline the request for better measurement ...
Finally, we conduct a large-scale comparative evaluation of 34 representative two-factor schemes, and our results outline the request for better measurement ...
Ding Wang , Qianchen Gu, Haibo Cheng, Ping Wang: The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes.
Despite over two decades of continuous efforts, how to design a secure and efficient two-factor authentication scheme remains an open issue.
The request for better measurement: A comparative evaluation of two-factor authentication schemes.
People also ask
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes. D Wang, Q Gu, H Cheng, P Wang. Proceedings of the 11th ACM ...
The quest to replace passwords: a Framework for comparative evaluation of web authentication schemes. IEEE Symposium on Security and Privacy, 2012. Page 10 ...