Cited By
View all- Cambou BPhilabaum CHoffstein JHerlihy M(2023)Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust EnvironmentsAxioms10.3390/axioms1206053112:6(531)Online publication date: 29-May-2023
- Huang LWang C(2022)PCR-Auth: Solving Authentication Puzzle Challenge with Encoded Palm Contact Response2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833564(1034-1048)Online publication date: May-2022
- Mayrhofer RSigg S(2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021