Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2021
/
Article
/
Tab 3
/
Research Article
Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild
Table 3
Brute-force attack duration according to PIN length.
# of digits
4
5
6
7
8
Time
1.7 min
17 min
2.8 hours
1.1 days
11 days