I Bought a New Security Token and All I Got Was This Lousy Phish—Relay Attacks on Visual Code Authentication Schemes
Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-319-12400-1_19
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2014
Authors
Publisher
Springer International Publishing