Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
We evaluate two decades of proposals to replace text passwords for general-purpose user
authentication on the web using a broad set of twenty-five usability, deployability and …
authentication on the web using a broad set of twenty-five usability, deployability and …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …
User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
N Gunson, D Marshall, H Morton, M Jack - Computers & Security, 2011 - Elsevier
This paper describes an experiment to investigate user perceptions of the usability and
security of single-factor and two-factor authentication methods in automated telephone …
security of single-factor and two-factor authentication methods in automated telephone …
[PDF][PDF] EMV in a nutshell
J Van den Breekel, DA Ortiz-Yepes, E Poll, บันทึก อ้างอิง อ้างโดย179 บทความที่เกี่ยวข้อง ทั้งหมด 17 ฉบับ
A birthday present every eleven wallets? the security of customer-chosen banking pins
We provide the first published estimates of the difficulty of guessing a human-chosen 4-digit
PIN. We begin with two large sets of 4-digit sequences chosen outside banking for online …
PIN. We begin with two large sets of 4-digit sequences chosen outside banking for online …
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …
interest in the past two decades. While security-related issues have been well studied, how …
The EMV standard: Break, fix, verify
EMV is the international protocol standard for smartcard payment and is used in over 9
billion cards worldwide. Despite the standard's advertised security, various issues have …
billion cards worldwide. Despite the standard's advertised security, various issues have …
Consumer-facing technology fraud: Economics, attack methods and potential solutions
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …