First Page | Document Content | |
---|---|---|
Date: 2016-04-22 11:46:30Computer access control Computer security Cryptography Federated identity Webmail Identity management Cross-platform software Google Account Multi-factor authentication Password Gmail Mail.com | Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis Foundation for Research and Technology—Hellas (FORTH), Greece {petAdd to Reading ListSource URL: www.necoma-project.euDownload Document from Source WebsiteFile Size: 431,78 KBShare Document on Facebook |
What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Jeremiah Onaolapo, Enrico Mariconti, and Gianluca Stringhini University College London {j.onaolapo, e.mariconti, g.stringhiDocID: 1xUzg - View Document | |
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts Emeric Bernard-Jones, Jeremiah Onaolapo, and Gianluca Stringhini University College London {j.onaolapo,g.strDocID: 1xTL4 - View Document | |
PDF DocumentDocID: 1xSKw - View Document | |
PDF DocumentDocID: 1xPRY - View Document | |
PDF DocumentDocID: 1xBTy - View Document |