Phishing-resistant multi factor authentication
The advent of the internet has revolutionized how people connect and interact, but it also brings various severe consequences such as data leakage when weak authentication method is implemented. Two-factor authentication(2FA) is a widely adopted method, yet vulnerabilities have been discovered to by...
Saved in:
| Main Author: | |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2025
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/7183/1/fyp_CN_2025_KEY.pdf http://eprints.utar.edu.my/7183/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!
