Cited By
View all- Shrestha PMahdad ASaxena N(2024)Sound-based Two-factor Authentication: Vulnerabilities and RedesignACM Transactions on Privacy and Security10.1145/363217527:1(1-27)Online publication date: 10-Jan-2024
- Piet JSharma APaxson VWagner DCalandrino JTroncoso C(2023)Network detection of interactive SSH impostors using deep learningProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620477(4283-4300)Online publication date: 9-Aug-2023
- Su YJiang GDu YChen YLiu HRen YDai HWang YLi SChen Y(2023) P 2 Auth: Two-Factor Authentication Leveraging PIN and Keystroke-Induced PPG Measurements 2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS57875.2023.00074(726-737)Online publication date: Jul-2023
- Show More Cited By