Login / Signup
Beyond RACF: Extending user authentication controls.
Paul Lynch
Published in:
Comput. Secur. (1991)
Keyphrases
</>
user authentication
authentication scheme
keystroke dynamics
security analysis
biometric authentication
information security
remote user authentication scheme
authentication systems
biometric systems
authentication protocol
sensor networks
real time
databases
image features
intrusion detection