Jubur, Mohammed
7  Ergebnisse:
Personensuche X
?
1

Breaking Mobile Notification-based Authentication with Conc..:

, In: Proceedings of the 29th Annual International Conference on Mobile Computing and Networking,
 
?
2

Countering Concurrent Login Attacks in "Just Tap" Push-base..:

, In: 2021 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
3

Bypassing Push-based Second Factor and Passwordless Authent..:

, In: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security,
 
?
4

Analyzing the Security of OTP 2FA in the Face of Malicious ..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
 
?
5

Two-factor Password-authenticated Key Exchange with End-to-..:

Jarecki, Stanislaw ; Jubur, Mohammed ; Krawczyk, Hugo..
ACM Transactions on Privacy and Security.  24 (2021)  3 - p. 1-37 , 2021
 
?
6

A hidden-password online password manager:

, In: Proceedings of the 36th Annual ACM Symposium on Applied Computing,
 
?
7

Two-factor Password-authenticated Key Exchange with End-to-..:

Jarecki, Stanislaw ; Jubur, Mohammed ; Krawczyk, Hugo..
ACM Transactions on Privacy and Security (TOPS).  24 (2021)  3 - p. 1-37 , 2021
 
1-7