@inproceedings{inproceedings, title = {{Threat modelling in user performed authentication}}, url = {{}}, year = {{2008}}, month = {{1}}, author = {{Dong X and Clark JA and Jacob JL}}, doi = {{10.1007/978-3-540-88625-9-4}}, isbn = {{9783540886242}}, volume = {{5308 LNCS}}, journal = {{Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}}, pages = {{49-64}}, note = {{Accessed on 2024/12/20}}}