Excavating Vulnerabilities Lurking in Multi-Factor Authentication
Protocols: A Systematic Security AnalysisACM Computing Surveys (ACM CSUR), 2024 |
Evaluating the Influence of Multi-Factor Authentication and Recovery
Settings on the Security and Accessibility of User AccountsInternational Conference on Information Systems Security and Privacy (ICISSP), 2024 |