📣 Help Shape the Future of UKRI's Gateway to Research (GtR)

We're improving UKRI's Gateway to Research and are seeking your input! If you would be interested in being interviewed about the improvements we're making and to have your say about how we can make GtR more user-friendly, impactful, and effective for the Research and Innovation community, please email gateway@ukri.org.

Threat Modelling in User Performed Authentication

First Author: Dong X

Abstract

No abstract provided

Bibliographic Information

Digital Object Identifier: http://dx.doi.org/10.1007/978-3-540-88625-9_4

Publication URI: http://dx.doi.org/10.1007/978-3-540-88625-9_4

Type: Book Chapter

Book Title: Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings (2008)

Page Reference: 49-64

ISBN: 978-3-540-88624-2

ISSN: 1436-3798