Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3209886
Abstract: We investigate existing “password+hardware token”-based authentication schemes deployed in real-world applications and observe that they are vulnerable to critical threats. Specifically, a compromised manufacturer may issue a backdoored hardware token to a user and later…
read more here.
Keywords:
authentication;
hardware;
hardware tokens;
secure two ... See more keywords