<--- Back to Details
First PageDocument Content
Cryptography / Implicit authentication / Authentication / International Federation for Information Processing / Security engineering / Computer security
Date: 2017-02-20 12:19:35
Cryptography
Implicit authentication
Authentication
International Federation for Information Processing
Security engineering
Computer security

Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti

Add to Reading List

Source URL: www-users.cs.york.ac.uk

Download Document from Source Website

File Size: 952,89 KB

Share Document on Facebook

Similar Documents

Cryptography / Implicit authentication / Authentication / International Federation for Information Processing / Security engineering / Computer security

Privacy-Preserving Implicit Authentication Nashad Safa Rei Safavi-Naini Siamak Shahandashti

DocID: 1uRm2 - View Document

Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1.

DocID: 1utsn - View Document

Computer access control / Cryptography / Computer security / Security / Access control / Usability / Authentication / Notary / Packaging / Implicit authentication / Password

Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON

DocID: 1qMFQ - View Document

Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1.

DocID: 1m7jR - View Document

Password / Active Directory / Authentication / Online banking / Phishing / Computer security / Security / Computer network security / Computing

Insidious Implicit Windows Trust Relationships PLEASE STAND BY 7 June 2013 – BSides Detroit

DocID: 11umi - View Document