Threat Modelling in User Performed Authentication

First Author: Dong X

Abstract

No abstract provided

Bibliographic Information

Digital Object Identifier: http://dx.doi.org/10.1007/978-3-540-88625-9_4

Publication URI: http://dx.doi.org/10.1007/978-3-540-88625-9_4

Type: Book Chapter

Book Title: Information and Communications Security - 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings (2008)

Page Reference: 49-64

ISBN: 978-3-540-88624-2

ISSN: 1436-3798