Citation Impact
Citing Papers
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016 Standout
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
2014
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
2014
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
2014
Works of Karsten Nohl being referenced
Reverse-engineering a cryptographic RFID tag
2008