Lecture

Authentication - Tokens

Description

This lecture covers the shortcomings of biometrics, the concept of tokens, how tokens work, and the implementation of two-factor authentication. It explains the operation of tokens, the process of obtaining a random number from a seed, and the use of cryptographic functions for authentication.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.