Back to Results
First PageMeta Content
Access control / Two-factor authentication / Password / Authentication / Security token / Transaction authentication number / SQL injection / Pass the hash / One-time password / Security / Computer security / Cryptography


How To Count To Two: What “Two Factor Authentication” Misses Eugene Shablygin, Sergey Bratus February 9, Double, Double Toil and Trouble The Bard
Add to Reading List

Document Date: 2015-02-10 16:05:25


Open Document

File Size: 340,26 KB

Share Result on Facebook

Company

Verizon / Intel / /

Country

United States / /

Event

Man-Made Disaster / /

IndustryTerm

online contact / aggregate server / web app authentication dialogs / authentication server / leisure web browsing / car accident / maintained production software / server systems / web app accounts / target network / password-creation software modules / security technologies / web shopping / cryptographic protocols / sound human-scale trust protocols / remote communications / user applications / social networking / little or none hardware / /

OperatingSystem

Unix / MacOS / Android / Microsoft Windows / /

Organization

Lateral / Department of Defense / IEEE Computer Society / /

Person

Denise Anthony / Sergey Bratus / Sean W. Smith / Collin Mulliner / Patrick Stewin / Dan Geer / Jean-Pierre Seifert / Eugene Shablygin / Adrian Perrig / Emmanuel Owusu / Jun Han / Elie Bursztein / Angelika Moscicki / Ravishankar Borgaonkar / Jonathan Aigrain / Zishuang (Eileen) Ye / John C. Mitchell / Jitendra Malik / Greg Mori / Matt Blaze / Joy Zhang / Jan Krissler / Tobias Fiebig / /

Position

Software Guard / designer / administrator / /

Product

Franklin / SQL injection / /

ProgrammingLanguage

HTML / SQL / /

PublishedMedium

The End is Nigh / /

Technology

SMS / smart phone / Unix / smart phones / smartphone / screen capture / Android / operating system / HTML / sound human-scale trust protocols / SSL / pdf / security technologies / DNS / Smartphones / http / GUI / /

URL

www.hotmobile / www.cs.sfu.ca/~mori/research/papers/mori_cvpr03 / www.blackhat.com/docs/eu-14/materials / www.crypto.com/papers/humancambridgepreproc.pdf / www.verizonenterprise.com/DBIR/2014 / www.usenix.org/legacy/event/sec02/full_papers/ye/ye / http /

SocialTag