Al-Ameen, Mahdi Nasrullah; Haque, S.M. Taiabul; Wright, … - In: Information & Computer Security 24 (2016) 4, pp. 386-399
Purpose Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a...