Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks

Wenhao Wang, Guyue Li, Zhiming Chu, Haobo Li, Daniele Faccio

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Fingerprint

Dive into the research topics of 'Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks'. Together they form a unique fingerprint.

Keyphrases

Computer Science