@dblp

TwoKind authentication: usable authenticators for untrustworthy environments.

, , , , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 169-170. ACM, (2007)

Links and resources

Tags