Login / Signup

Bounds on authentication systems in query model.

Reihaneh Safavi-NainiPeter R. Wild
Published in: ICITS (2005)
Keyphrases
  • similarity measure
  • e government
  • intrusion detection
  • user authentication