Cited By
View all- Jubur MShrestha PSaxena N(2025)An In-Depth Analysis of Password Managers and Two-Factor Authentication ToolsACM Computing Surveys10.1145/371111757:5(1-32)Online publication date: 24-Jan-2025
- Mahdad AJubur MSaxena NLuo BLiao XXu JKirda ELie D(2024)Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display AuthenticatorsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690286(1686-1700)Online publication date: 2-Dec-2024
- Makowski JPöhn D(2023)Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity WinsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605024(1-9)Online publication date: 29-Aug-2023
- Show More Cited By