Downgrade/Recovery Attacks | part of Hacking Multifactor Authentication | Wiley Data and Cybersecurity books | IEEE Xplore