Cited By
View all- Alaca FAbdou Avan Oorschot P(2021)Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication SchemesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.290890718:2(534-549)Online publication date: 8-Mar-2021
- Ferrag MMaglaras LArgyriou AKosmanos DJanicke H(2018)Security for 4G and 5G cellular networksJournal of Network and Computer Applications10.1016/j.jnca.2017.10.017101:C(55-82)Online publication date: 1-Jan-2018
- Ruoti SSeamons K(2017)End-to-End PasswordsProceedings of the 2017 New Security Paradigms Workshop10.1145/3171533.3171542(107-121)Online publication date: 1-Oct-2017
- Show More Cited By