E Grosse, M Upadhyay - IEEE
Security & Privacy, 2012 - ieeexplore.ieee.org
… submit a bearer-token credential, such as a password, to a … protected from compromise.However,
not nearly enough of our … Now if users go a long time without typing a 2sv validation …