First Page | Document Content | |
---|---|---|
Date: 2017-02-20 12:19:35Cryptography Implicit authentication Authentication International Federation for Information Processing Security engineering Computer security | Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak ShahandashtiAdd to Reading ListSource URL: www-users.cs.york.ac.ukDownload Document from Source WebsiteFile Size: 952,89 KBShare Document on Facebook |
Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak ShahandashtiDocID: 1uRm2 - View Document | |
Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1.DocID: 1utsn - View Document | |
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ONDocID: 1qMFQ - View Document | |
Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1.DocID: 1m7jR - View Document | |
Insidious Implicit Windows Trust Relationships PLEASE STAND BY 7 June 2013 – BSides DetroitDocID: 11umi - View Document |