Cited By
View all- Alsheavi AHawbani AOthman WWANG XQaid GZhao LAl-Dubai AZhi LIsmail AJhaveri RAlsamhi SAl-qaness M(2024)IoT Authentication Protocols: Challenges, and Comparative AnalysisACM Computing Surveys10.1145/3703444Online publication date: 30-Nov-2024
- Kruzikova ASuchanek JBroz MUkrop MMatyas V(2024)What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developersProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670885(1-11)Online publication date: 30-Jul-2024
- Yamaguchi SGomi HUehara T(2024)User Verification System using Location-based Dynamic Questions for Account Recovery2024 IEEE Security and Privacy Workshops (SPW)10.1109/SPW63631.2024.00006(9-16)Online publication date: 23-May-2024
- Show More Cited By