Date: 2015-02-13 13:31:35Social engineering Internet protocols One-time password Two-factor authentication Password Phishing Transaction authentication number Authentication Man-in-the-middle attack Security Computer security Cryptography | | CERIAS Tech ReportDefending against Password Exposure using Deceptive Covert Communication by Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information AssuraAdd to Reading ListSource URL: www.cerias.purdue.eduDownload Document from Source Website File Size: 280,68 KBShare Document on Facebook
|