Citation Impact

Citing Papers

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016 Standout
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
2014
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
2014
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
2014

Works of Karsten Nohl being referenced

Reverse-engineering a cryptographic RFID tag
2008
Rankless by CCL
2026