True2F: Backdoor-Resistant Authentication Tokens |
40th IEEE Symposium on Security and Privacy
|
T/Key: Second-Factor Authentication From Secure Hash Chains |
ACM CCS 2017
|
Tick Tock: Building Browser Red Pills from Timing Side Channels |
WOOT '14
|
Hacking Blind |
35th IEEE Symposium on Security and Privacy
|