Emulating U2F authenticator devices | IEEE Conference Publication | IEEE Xplore