Articles with "hardware tokens" as a keyword



Photo from wikipedia

A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3209886

Abstract: We investigate existing “password+hardware token”-based authentication schemes deployed in real-world applications and observe that they are vulnerable to critical threats. Specifically, a compromised manufacturer may issue a backdoored hardware token to a user and later… read more here.

Keywords: authentication; hardware; hardware tokens; secure two ... See more keywords