n-Auth: mobile authentication done right
dc.contributor.author | Peeters, Roel | |
dc.contributor.author | Hermans, Jens | |
dc.contributor.author | Maene, Pieter | |
dc.contributor.author | Grenman, Katri | |
dc.contributor.author | Halunen, Kimmo | |
dc.contributor.author | Haikio, Juha | |
dc.date.accessioned | 2021-10-24T10:50:25Z | |
dc.date.available | 2021-10-24T10:50:25Z | |
dc.date.issued | 2017 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/29156 | |
dc.source | IIOimport | |
dc.title | n-Auth: mobile authentication done right | |
dc.type | Proceedings paper | |
dc.source.peerreview | yes | |
dc.source.beginpage | 1 | |
dc.source.endpage | 15 | |
dc.source.conference | 33rd Annual Computer Security Applications Conference , Annual Computer Security Applications Conference - APSAC | |
dc.source.conferencedate | 4/12/2017 | |
dc.source.conferencelocation | Orlando, FL USA | |
dc.identifier.url | https://dl.acm.org/citation.cfm?id=3134600.3134613 | |
imec.availability | Published - imec |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |