<--- Back to Details
First PageDocument Content
Computer access control / Computer security / Cryptography / Federated identity / Webmail / Identity management / Cross-platform software / Google Account / Multi-factor authentication / Password / Gmail / Mail.com
Date: 2016-04-22 11:46:30
Computer access control
Computer security
Cryptography
Federated identity
Webmail
Identity management
Cross-platform software
Google Account
Multi-factor authentication
Password
Gmail
Mail.com

Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis Foundation for Research and Technology—Hellas (FORTH), Greece {pet

Add to Reading List

Source URL: www.necoma-project.eu

Download Document from Source Website

File Size: 431,78 KB

Share Document on Facebook

Similar Documents

What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Jeremiah Onaolapo, Enrico Mariconti, and Gianluca Stringhini University College London {j.onaolapo, e.mariconti, g.stringhi

What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Jeremiah Onaolapo, Enrico Mariconti, and Gianluca Stringhini University College London {j.onaolapo, e.mariconti, g.stringhi

DocID: 1xUzg - View Document

BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts Emeric Bernard-Jones, Jeremiah Onaolapo, and Gianluca Stringhini University College London  {j.onaolapo,g.str

BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts Emeric Bernard-Jones, Jeremiah Onaolapo, and Gianluca Stringhini University College London {j.onaolapo,g.str

DocID: 1xTL4 - View Document

PDF Document

DocID: 1xSKw - View Document

PDF Document

DocID: 1xPRY - View Document

PDF Document

DocID: 1xBTy - View Document