Amanote Research
Register
Sign In
On the Usability of Two-Factor Authentication
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
- Germany
doi 10.1007/978-3-319-23829-6_11
Full Text
Open PDF
Abstract
Available in
full text
Categories
Computer Networks
Communications
Date
January 1, 2015
Authors
Ding Wang
Ping Wang
Publisher
Springer International Publishing
Related search
User Perceptions of Security and Usability of Single-Factor and Two-Factor Authentication in Automated Telephone Banking
Computers and Security
Law
Computer Science
Biometric Authentication — Security and Usability
IFIP Advances in Information and Communication Technology
Computer Networks
Information Systems
Management
Communications
Two Factor Authentication Using Smartphone Generated One Time Password
IOSR Journal of Computer Engineering
Two-Factor Authentication Algorithm Implementation With Additional Security Parameter Based on Mobile Application
On the Security of Multi-Factor Authentication: Several Instructive Examples
Identity Authentication Based on Two-Beam Interference
Journal of Computer and Communications
Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
Sensors
Instrumentation
Information Systems
Electronic Engineering
Biochemistry
Analytical Chemistry
Molecular Physics,
Electrical
Atomic
Medicine
Optics
Cybercrime and Security in Nepal: The Need for Two-Factor Authentication in Social Media
Crossing the Border: International Journal of Interdisciplinary Studies
Multi-Factor Attendance Authentication System
International Journal of Software Engineering and Computer Systems