Login / Signup
Trusted Authentication Between User and Machine.
Soyoung Doo
Jongnyo Kim
Eunbae Kong
Published in:
ICEIS (3) (2003)
Keyphrases
</>
user authentication
user interaction
end users
user experience
social networks
user defined
user satisfaction
user feedback
user preferences
user groups
security analysis
authentication scheme